Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-51782 (GCVE-0-2023-51782)
Vulnerability from cvelistv5
Published
2023-12-25 00:00
Modified
2024-08-02 22:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:11.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "tags": [ "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3710-1] linux security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3711-1] linux-5.10 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-11T21:06:48.195981", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3710-1] linux security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3711-1] linux-5.10 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-51782", "datePublished": "2023-12-25T00:00:00", "dateReserved": "2023-12-25T00:00:00", "dateUpdated": "2024-08-02T22:48:11.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-51782\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-01-11T19:15:12.727\",\"lastModified\":\"2024-11-21T08:38:47.863\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en el kernel de Linux anterior a 6.6.8. rose_ioctl en net/rose/af_rose.c tiene un use after free debido a una condici\u00f3n de ejecuci\u00f3n rose_accept.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"2.6.12\",\"versionEndExcluding\":\"6.6.8\",\"matchCriteriaId\":\"C5C35A7D-82A5-436F-925A-384D92679784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB349B2-3F78-4197-882B-90ADB3BF645A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0038DE-E183-4958-A6E3-CE3821FEAFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C6E04-4F04-44A3-8DB8-93899903CFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C78EDA4-8BE6-42FC-9512-49032D525A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F2E5CA-13C6-4601-B530-D465CBF73D1C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
gsd-2023-51782
Vulnerability from gsd
Modified
2023-12-26 06:01
Details
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-51782" ], "details": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "id": "GSD-2023-51782", "modified": "2023-12-26T06:01:25.138905Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-51782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "name": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3710-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "name": "[debian-lts-announce] 20240111 [SECURITY] [DLA 3711-1] linux-5.10 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C35A7D-82A5-436F-925A-384D92679784", "versionEndExcluding": "6.6.8", "versionStartExcluding": "2.6.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", "matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", "matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en el kernel de Linux anterior a 6.6.8. rose_ioctl en net/rose/af_rose.c tiene un use after free debido a una condici\u00f3n de ejecuci\u00f3n rose_accept." } ], "id": "CVE-2023-51782", "lastModified": "2024-01-18T19:31:37.630", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-11T19:15:12.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
wid-sec-w-2024-0073
Vulnerability from csaf_certbund
Published
2024-01-11 23:00
Modified
2024-08-19 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0073 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0073.json" }, { "category": "self", "summary": "WID-SEC-2024-0073 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0073" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6681-2 vom 2024-03-11", "url": "https://ubuntu.com/security/notices/USN-6681-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6681-2 vom 2024-03-11", "url": "https://www.cybersecurity-help.cz/vdb/SB2024031133" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0468-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0469-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0463-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6639-1 vom 2024-02-15", "url": "https://ubuntu.com/security/notices/USN-6639-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0476-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0474-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-01-11", "url": "https://github.com/advisories/GHSA-6hcj-vfvx-mmcm" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0484-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0478-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0515-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0514-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0516-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0483-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6686-2 vom 2024-03-13", "url": "https://ubuntu.com/security/notices/USN-6686-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6681-3 vom 2024-03-13", "url": "https://ubuntu.com/security/notices/USN-6681-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6681-1 vom 2024-03-07", "url": "https://ubuntu.com/security/notices/USN-6681-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6680-1 vom 2024-03-07", "url": "https://ubuntu.com/security/notices/USN-6680-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6647-2 vom 2024-02-29", "url": "https://ubuntu.com/security/notices/USN-6647-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6686-1 vom 2024-03-08", "url": "https://ubuntu.com/security/notices/USN-6686-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6680-2 vom 2024-03-08", "url": "https://ubuntu.com/security/notices/USN-6680-2" }, { "category": "external", "summary": "IGEL Security Notice ISN-2024-06 vom 2024-03-12", "url": "https://kb.igel.com/securitysafety/en/isn-2024-06-os-11-kernel-vulnerabilities-117259724.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6646-1 vom 2024-02-20", "url": "https://ubuntu.com/security/notices/USN-6646-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6681-4 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6681-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6686-3 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6686-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6680-3 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6680-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6686-4 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6686-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6705-1 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6705-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6716-1 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6716-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6686-5 vom 2024-03-27", "url": "https://ubuntu.com/security/notices/USN-6686-5" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1669-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff", "tracking": { "current_release_date": "2024-08-19T22:00:00.000+00:00", "generator": { "date": "2024-08-20T13:10:43.661+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0073", "initial_release_date": "2024-01-11T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-11T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-02-29T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-06T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-07T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-19T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-25T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-27T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "16" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.10.100", "product": { "name": "IGEL OS \u003c11.10.100", "product_id": "T033380" } }, { "category": "product_version", "name": "11.10.100", "product": { "name": "IGEL OS 11.10.100", "product_id": "T033380-fixed", "product_identification_helper": { "cpe": "cpe:/o:igel:os:11.10.100" } } } ], "category": "product_name", "name": "OS" } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.6.8", "product": { "name": "Open Source Linux Kernel \u003c6.6.8", "product_id": "T032008" } }, { "category": "product_version", "name": "6.6.8", "product": { "name": "Open Source Linux Kernel 6.6.8", "product_id": "T032008-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.8" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-51782", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht in der Komponente rose_ioctl in net/rose/af_rose.c aufgrund einer Race Condition, die zu einem Use-after-free-Problem f\u00fchrt. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T014381", "T002207", "T033380", "T000126", "T034583" ] }, "release_date": "2024-01-11T23:00:00.000+00:00", "title": "CVE-2023-51782" } ] }
suse-su-2024:0478-1
Vulnerability from csaf_suse
Published
2024-02-15 08:10
Modified
2024-02-15 08:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
The following non-security bugs were fixed:
- build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713)
- mkspec: Include constraints for both multibuild and plain package always
- rpm/kernel-docs.spec.in: fix build with 6.8 Since upstream commit f061c9f7d058
- rpm/kernel-source.rpmlintrc: add action-ebpf Upstream commit a79d8ba734bd
- rpm/mkspec: use kernel-source: prefix for constraints on multibuild Otherwise the constraints are not applied with multibuild enabled.
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
Patchnames
SUSE-2024-478,SUSE-SLE-Module-Live-Patching-15-SP2-2024-478,SUSE-SLE-Product-HA-15-SP2-2024-478,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-478,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-478,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-478
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n\nThe following non-security bugs were fixed:\n\n- build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713)\n- mkspec: Include constraints for both multibuild and plain package always\n- rpm/kernel-docs.spec.in: fix build with 6.8 Since upstream commit f061c9f7d058\n- rpm/kernel-source.rpmlintrc: add action-ebpf Upstream commit a79d8ba734bd \n- rpm/mkspec: use kernel-source: prefix for constraints on multibuild Otherwise the constraints are not applied with multibuild enabled.\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-478,SUSE-SLE-Module-Live-Patching-15-SP2-2024-478,SUSE-SLE-Product-HA-15-SP2-2024-478,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-478,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-478,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-478", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0478-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0478-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240478-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0478-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T08:10:02Z", "generator": { "date": "2024-02-15T08:10:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0478-1", "initial_release_date": "2024-02-15T08:10:02Z", "revision_history": [ { "date": "2024-02-15T08:10:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-default-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "product": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "product_id": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150200.24.178.1.aarch64", "product_id": "kernel-syms-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-devel-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-devel-5.3.18-150200.24.178.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-docs-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-docs-5.3.18-150200.24.178.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-docs-html-5.3.18-150200.24.178.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-macros-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-macros-5.3.18-150200.24.178.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-source-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-source-5.3.18-150200.24.178.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150200.24.178.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150200.24.178.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150200.24.178.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-debug-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "product_id": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150200.24.178.1.ppc64le", "product_id": "kernel-syms-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-default-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "product": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "product_id": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-default-devel-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-default-extra-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-obs-build-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-syms-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-syms-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150200.24.178.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150200.24.178.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-debug-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-default-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "product_id": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.178.1.150200.9.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_178-preempt-1-150200.5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_178-preempt-1-150200.5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_178-preempt-1-150200.5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150200.24.178.1.x86_64", "product_id": "kernel-syms-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.178.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.178.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.178.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.178.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.178.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.178.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T08:10:02Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0463-1
Vulnerability from csaf_suse
Published
2024-02-14 08:17
Modified
2024-02-14 08:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
Patchnames
SUSE-2024-463,SUSE-SUSE-MicroOS-5.1-2024-463,SUSE-SUSE-MicroOS-5.2-2024-463
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-463,SUSE-SUSE-MicroOS-5.1-2024-463,SUSE-SUSE-MicroOS-5.2-2024-463", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0463-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0463-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240463-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0463-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-14T08:17:58Z", "generator": { "date": "2024-02-14T08:17:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0463-1", "initial_release_date": "2024-02-14T08:17:58Z", "revision_history": [ { "date": "2024-02-14T08:17:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.158.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.158.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.158.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.158.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.158.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.158.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.158.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.158.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.158.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.158.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.158.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.158.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.158.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.158.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.158.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.158.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.158.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.158.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.158.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T08:17:58Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0484-1
Vulnerability from csaf_suse
Published
2024-02-15 12:51
Modified
2024-02-15 12:51
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
The following non-security bugs were fixed:
- 9p: missing chunk of 'fs/9p: Do not update file type when updating file attributes' (git-fixes).
- ACPICA: Avoid cache flush inside virtual machines (git-fixes).
- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).
- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).
- acpi/nfit: improve bounds checking for 'func' (git-fixes).
- affs: fix basic permission bits to actually work (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- asix: Add check for usbnet_get_endpoints (git-fixes).
- bnxt_en: Log unknown link speed appropriately (git-fixes).
- build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).
- chardev: fix error handling in cdev_device_add() (git-fixes).
- configfs: fix a deadlock in configfs_symlink() (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).
- configfs: fix memleak in configfs_release_bin_file (git-fixes).
- configfs: new object reprsenting tree fragments (git-fixes).
- configfs: provide exclusion between IO and removals (git-fixes).
- configfs: stash the data we need into configfs_buffer at open time (git-fixes).
- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- ext4: Avoid freeing inodes on dirty list (bsc#1216989).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).
- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).
- fs/file.c: initialize init_files.resize_wait (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).
- fs: ratelimit __find_get_block_slow() failure message (git-fixes).
- fs: warn about impending deprecation of mandatory locks (git-fixes).
- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Do not call dlm after protocol is unmounted (git-fixes).
- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).
- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix lru_count going negative (git-fixes).
- gfs2: Fix marking bitmaps non-full (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).
- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).
- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Special-case rindex for gfs2_grow (git-fixes).
- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).
- gfs2: add validation checks for size of superblock (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).
- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).
- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).
- gfs2: fix use-after-free on transaction ail lists (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).
- gfs2: report 'already frozen/thawed' errors (git-fixes).
- gfs2: take jdata unstuff into account in do_grow (git-fixes).
- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).
- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).
- help_next should increase position index (git-fixes).
- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).
- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).
- kernfs: bring names in comments in line with code (git-fixes).
- kernfs: fix use-after-free in __kernfs_remove (git-fixes).
- libceph: use kernel_connect() (bsc#1219446).
- libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes).
- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).
- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (git-fixes).
- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).
- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).
- libnvdimm/region: Fix label activation vs errors (git-fixes).
- libnvdimm: Fix compilation warnings with W=1 (git-fixes).
- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).
- libnvdimm: Validate command family indices (git-fixes).
- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).
- locks: print a warning when mount fails due to lack of 'mand' support (git-fixes).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- mlx4: handle non-napi callers to napi_poll (git-fixes).
- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).
- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).
- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).
- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net: (cpts) fix a missing check of clk_prepare (git-fixes).
- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).
- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).
- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).
- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).
- net: ethernet: ti: fix possible object reference leak (git-fixes).
- net: fec: Do not use netdev messages too early (git-fixes).
- net: ks8851: Delay requesting IRQ until opened (git-fixes).
- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).
- net: ks8851: Set initial carrier state to down (git-fixes).
- net: macb: Add null check for PCLK and HCLK (git-fixed).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).
- net: mvneta: fix double free of txq->buf (git-fixes).
- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).
- net: phylink: avoid resolving link state too early (git-fixes).
- net: sfp: do not probe SFP module before we're attached (git-fixes).
- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).
- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).
- net: stmmac: do not overwrite discard_frame status (git-fixes).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).
- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).
- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).
- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).
- net: systemport: Fix reception of BPDUs (git-fixes).
- net: xilinx: fix possible object reference leak (git-fixed).
- nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968).
- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).
- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: fix orangefs df output (git-fixes).
- orangefs: rate limit the client not running info message (git-fixes).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).
- preserve KABI for struct plat_stmmacenet_data (git-fixes).
- preserve KABI for struct sfp_socket_ops (git-fixes).
- proc: fix /proc/*/map_files lookup (git-fixes).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).
- pstore/ram: Run without kernel crash dump region (git-fixes).
- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- r8169: fix data corruption issue on RTL8402 (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- scripts/git_sort/git_sort.py: Add 'perf-tools' branch
- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).
- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- veth: Fixing transmit return status for dropped packets (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- writeback: Export inode_io_list_del() (bsc#1216989).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).
- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).
- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).
- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (git-fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).
- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- x86: Clear .brk area at early boot (git-fixes).
- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).
- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).
- x86: Mark stop_this_cpu() __noreturn (git-fixes).
- x86: Pin task-stack in __get_wchan() (git-fixes).
- x86: __always_inline __{rd,wr}msr() (git-fixes).
Patchnames
SUSE-2024-484,SUSE-SLE-HA-12-SP5-2024-484,SUSE-SLE-Live-Patching-12-SP5-2024-484,SUSE-SLE-SDK-12-SP5-2024-484,SUSE-SLE-SERVER-12-SP5-2024-484,SUSE-SLE-WE-12-SP5-2024-484
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n\n\nThe following non-security bugs were fixed:\n\n- 9p: missing chunk of \u0027fs/9p: Do not update file type when updating file attributes\u0027 (git-fixes).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).\n- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).\n- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).\n- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).\n- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).\n- acpi/nfit: improve bounds checking for \u0027func\u0027 (git-fixes).\n- affs: fix basic permission bits to actually work (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- bnxt_en: Log unknown link speed appropriately (git-fixes).\n- build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).\n- chardev: fix error handling in cdev_device_add() (git-fixes).\n- configfs: fix a deadlock in configfs_symlink() (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).\n- configfs: fix memleak in configfs_release_bin_file (git-fixes).\n- configfs: new object reprsenting tree fragments (git-fixes).\n- configfs: provide exclusion between IO and removals (git-fixes).\n- configfs: stash the data we need into configfs_buffer at open time (git-fixes).\n- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713). \n- ext4: Avoid freeing inodes on dirty list (bsc#1216989).\n- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).\n- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).\n- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).\n- fs/file.c: initialize init_files.resize_wait (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).\n- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).\n- fs: ratelimit __find_get_block_slow() failure message (git-fixes).\n- fs: warn about impending deprecation of mandatory locks (git-fixes).\n- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).\n- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).\n- gfs2: Do not call dlm after protocol is unmounted (git-fixes).\n- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).\n- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).\n- gfs2: Fix inode height consistency check (git-fixes).\n- gfs2: Fix lru_count going negative (git-fixes).\n- gfs2: Fix marking bitmaps non-full (git-fixes).\n- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).\n- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).\n- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).\n- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).\n- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).\n- gfs2: Special-case rindex for gfs2_grow (git-fixes).\n- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).\n- gfs2: add validation checks for size of superblock (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).\n- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).\n- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).\n- gfs2: fix use-after-free on transaction ail lists (git-fixes).\n- gfs2: ignore negated quota changes (git-fixes).\n- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).\n- gfs2: report \u0027already frozen/thawed\u0027 errors (git-fixes).\n- gfs2: take jdata unstuff into account in do_grow (git-fixes).\n- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).\n- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).\n- help_next should increase position index (git-fixes).\n- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).\n- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).\n- kernfs: bring names in comments in line with code (git-fixes).\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- libceph: use kernel_connect() (bsc#1219446).\n- libnvdimm/btt: Fix LBA masking during \u0027free list\u0027 population (git-fixes).\n- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).\n- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (git-fixes).\n- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).\n- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).\n- libnvdimm/region: Fix label activation vs errors (git-fixes).\n- libnvdimm: Fix compilation warnings with W=1 (git-fixes).\n- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).\n- libnvdimm: Validate command family indices (git-fixes).\n- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).\n- locks: print a warning when mount fails due to lack of \u0027mand\u0027 support (git-fixes).\n- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).\n- mlx4: handle non-napi callers to napi_poll (git-fixes).\n- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).\n- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).\n- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).\n- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net: (cpts) fix a missing check of clk_prepare (git-fixes).\n- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).\n- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).\n- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).\n- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).\n- net: ethernet: ti: fix possible object reference leak (git-fixes).\n- net: fec: Do not use netdev messages too early (git-fixes).\n- net: ks8851: Delay requesting IRQ until opened (git-fixes).\n- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).\n- net: ks8851: Set initial carrier state to down (git-fixes).\n- net: macb: Add null check for PCLK and HCLK (git-fixed).\n- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).\n- net: phylink: avoid resolving link state too early (git-fixes).\n- net: sfp: do not probe SFP module before we\u0027re attached (git-fixes).\n- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).\n- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).\n- net: stmmac: do not overwrite discard_frame status (git-fixes).\n- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).\n- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).\n- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).\n- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).\n- net: systemport: Fix reception of BPDUs (git-fixes).\n- net: xilinx: fix possible object reference leak (git-fixed).\n- nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968).\n- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).\n- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).\n- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).\n- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).\n- orangefs: fix orangefs df output (git-fixes).\n- orangefs: rate limit the client not running info message (git-fixes).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).\n- preserve KABI for struct plat_stmmacenet_data (git-fixes).\n- preserve KABI for struct sfp_socket_ops (git-fixes).\n- proc: fix /proc/*/map_files lookup (git-fixes).\n- pstore/ram: Check start of empty przs during init (git-fixes).\n- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).\n- pstore/ram: Run without kernel crash dump region (git-fixes).\n- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (git-fixes).\n- reiserfs: Check the return value from __getblk() (git-fixes).\n- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- scripts/git_sort/git_sort.py: Add \u0027perf-tools\u0027 branch\n- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).\n- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).\n- statfs: enforce statfs[64] structure initialization (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).\n- veth: Fixing transmit return status for dropped packets (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- writeback: Export inode_io_list_del() (bsc#1216989). \n- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).\n- x86/alternatives: Sync core before enabling interrupts (git-fixes).\n- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).\n- x86/bugs: Add \u0027unknown\u0027 reporting for MMIO Stale Data (git-fixes).\n- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).\n- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).\n- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).\n- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).\n- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).\n- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).\n- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).\n- x86/lib: Fix overflow when counting digits (git-fixes).\n- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).\n- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).\n- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).\n- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).\n- x86/pat: Fix x86_has_pat_wp() (git-fixes).\n- x86/pat: Pass valid address to sanitize_phys() (git-fixes).\n- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).\n- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).\n- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).\n- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).\n- x86/topology: Fix duplicated core ID within a package (git-fixes).\n- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).\n- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).\n- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).\n- x86: Clear .brk area at early boot (git-fixes).\n- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).\n- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).\n- x86: Mark stop_this_cpu() __noreturn (git-fixes).\n- x86: Pin task-stack in __get_wchan() (git-fixes).\n- x86: __always_inline __{rd,wr}msr() (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-484,SUSE-SLE-HA-12-SP5-2024-484,SUSE-SLE-Live-Patching-12-SP5-2024-484,SUSE-SLE-SDK-12-SP5-2024-484,SUSE-SLE-SERVER-12-SP5-2024-484,SUSE-SLE-WE-12-SP5-2024-484", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0484-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0484-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240484-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0484-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1123986", "url": "https://bugzilla.suse.com/1123986" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1206889", "url": "https://bugzilla.suse.com/1206889" }, { "category": "self", "summary": "SUSE Bug 1212152", "url": "https://bugzilla.suse.com/1212152" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1216989", "url": "https://bugzilla.suse.com/1216989" }, { "category": "self", "summary": "SUSE Bug 1217525", "url": "https://bugzilla.suse.com/1217525" }, { "category": "self", "summary": "SUSE Bug 1217946", "url": "https://bugzilla.suse.com/1217946" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1219022", "url": "https://bugzilla.suse.com/1219022" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219445", "url": "https://bugzilla.suse.com/1219445" }, { "category": "self", "summary": "SUSE Bug 1219446", "url": "https://bugzilla.suse.com/1219446" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T12:51:27Z", "generator": { "date": "2024-02-15T12:51:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0484-1", "initial_release_date": "2024-02-15T12:51:27Z", "revision_history": [ { "date": "2024-02-15T12:51:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.194.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.194.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.194.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.194.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.194.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.194.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.194.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.194.1.aarch64", "product_id": "kernel-syms-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.194.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.194.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.194.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.194.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.194.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.194.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.194.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.194.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.194.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.194.1.noarch", "product_id": "kernel-devel-4.12.14-122.194.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.194.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.194.1.noarch", "product_id": "kernel-docs-4.12.14-122.194.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.194.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.194.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.194.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.194.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.194.1.noarch", "product_id": "kernel-macros-4.12.14-122.194.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.194.1.noarch", "product": { "name": "kernel-source-4.12.14-122.194.1.noarch", "product_id": "kernel-source-4.12.14-122.194.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.194.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.194.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.194.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.194.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.194.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.194.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.194.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.194.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.194.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.194.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.194.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.194.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.194.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.194.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.194.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.194.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.194.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.194.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.194.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.194.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.194.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-4.12.14-122.194.1.s390x", "product_id": "kernel-default-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.194.1.s390x", "product_id": "kernel-default-base-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.194.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.194.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.194.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.194.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.194.1.s390x", "product_id": "kernel-default-man-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.194.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.194.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.194.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.194.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.194.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.194.1.s390x", "product_id": "kernel-syms-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.194.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.194.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.194.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.194.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.194.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.194.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.194.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.194.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.194.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.194.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "product_id": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.194.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.194.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.194.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.194.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.194.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.194.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.194.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.194.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.194.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.194.1.x86_64", "product_id": "kernel-debug-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.194.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.194.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.194.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.194.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.194.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.194.1.x86_64", "product_id": "kernel-syms-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.194.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.194.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.194.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.194.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.194.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.194.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.194.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.194.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.194.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.194.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.194.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.194.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.194.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "moderate" } ], "title": "CVE-2023-6610" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.194.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.194.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.194.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:51:27Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0514-1
Vulnerability from csaf_suse
Published
2024-02-15 14:44
Modified
2024-02-15 14:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- Documentation: RAS: Add index and address translation section (jsc#PED-7618).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -> 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).
- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).
- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req->src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen < sg->length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req->dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip->i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernel-source: Fix description typo
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- s390: vfio-ap: tighten the NIB validity check (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
Patchnames
SUSE-2024-514,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-514,openSUSE-SLE-15.5-2024-514
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- Documentation: RAS: Add index and address translation section (jsc#PED-7618).\n- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).\n- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).\n- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)\n- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).\n- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)\n- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).\n- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).\n- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)\n- ACPI: video: check for error while searching for backlight device parent (git-fixes).\n- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).\n- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).\n- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).\n- ALSA: hda: Refer to correct stream index at loops (git-fixes).\n- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).\n- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).\n- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).\n- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).\n- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).\n- ASoC: amd: Add check for acp config flags (bsc#1219136).\n- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).\n- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).\n- ASoC: amd: Drop empty platform remove function (bsc#1219136).\n- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).\n- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).\n- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).\n- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).\n- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).\n- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).\n- ASoC: amd: acp: Add new cpu dai\u0027s in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).\n- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).\n- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).\n- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).\n- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).\n- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).\n- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).\n- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).\n- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).\n- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).\n- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).\n- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).\n- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).\n- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).\n- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).\n- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).\n- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).\n- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).\n- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).\n- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).\n- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).\n- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).\n- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).\n- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).\n- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).\n- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).\n- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).\n- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).\n- ASoC: amd: add acp6.2 irq handler (bsc#1219136).\n- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).\n- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).\n- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).\n- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).\n- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).\n- ASoC: amd: fix ACP version typo mistake (bsc#1219136).\n- ASoC: amd: fix spelling mistake: \u0027i.e\u0027 -\u003e \u0027i.e.\u0027 (bsc#1219136).\n- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).\n- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).\n- ASoC: amd: ps: Update copyright notice (bsc#1219136).\n- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).\n- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).\n- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).\n- ASoC: amd: ps: move irq handler registration (bsc#1219136).\n- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).\n- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).\n- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).\n- ASoC: amd: ps: remove unused variable (bsc#1219136).\n- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).\n- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).\n- ASoC: amd: ps: update the acp clock source (bsc#1219136).\n- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).\n- ASoC: amd: ps: use static function (bsc#1219136).\n- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).\n- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).\n- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).\n- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).\n- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).\n- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).\n- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).\n- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).\n- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).\n- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).\n- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).\n- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).\n- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).\n- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).\n- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).\n- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).\n- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).\n- ASoC: cs43130: Fix the position of const qualifier (git-fixes).\n- ASoC: da7219: Support low DC impedance headset (git-fixes).\n- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).\n- ASoC: ops: add correct range check for limiting volume (git-fixes).\n- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).\n- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).\n- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).\n- ASoC: wm8974: Correct boost mixer inputs (git-fixes).\n- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).\n- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).\n- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).\n- Documentation: Begin a RAS section (jsc#PED-7622).\n- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).\n- EDAC/amd64: Add context struct (jsc#PED-7615).\n- EDAC/amd64: Add get_err_info() to pvt-\u003eops (jsc#PED-7615).\n- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).\n- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).\n- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).\n- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).\n- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).\n- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).\n- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).\n- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).\n- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).\n- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).\n- EDAC/amd64: Remove module version string (jsc#PED-7615).\n- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).\n- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).\n- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).\n- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).\n- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).\n- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).\n- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).\n- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).\n- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).\n- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)\n- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).\n- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).\n- IB/iser: Prevent invalidating wrong MR (git-fixes)\n- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).\n- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).\n- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).\n- Input: xpad - add Razer Wolverine V2 support (git-fixes).\n- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).\n- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).\n- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)\n- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).\n- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).\n- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).\n- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).\n- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).\n- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).\n- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).\n- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).\n- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)\n- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)\n- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)\n- RDMA/irdma: Add wait for suspend on SQD (git-fixes)\n- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)\n- RDMA/irdma: Do not modify to SQD on error (git-fixes)\n- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)\n- RDMA/irdma: Refactor error handling in create CQP (git-fixes)\n- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)\n- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)\n- RDMA/rtrs-clt: Start hb after path_up (git-fixes)\n- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)\n- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)\n- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)\n- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)\n- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)\n- USB: xhci: workaround for grace period (git-fixes).\n- Update config files: enable ASoC AMD PS drivers (bsc#1219136)\n- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- apparmor: avoid crash when parsed profile name is empty (git-fixes).\n- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)\n- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.\n- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)\n- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)\n- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)\n- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)\n- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)\n- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)\n- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)\n- arm64: module: move find_section to header (jsc#PED-4729)\n- arm64: vdso: Fix \u0027no previous prototype\u0027 warning (jsc#PED-4729)\n- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)\n- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- attr: block mode changes of symlinks (git-fixes).\n- badblocks: add helper routines for badblock ranges handling (bsc#1174649).\n- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).\n- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).\n- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).\n- badblocks: switch to the improved badblock handling code (bsc#1174649).\n- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).\n- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).\n- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).\n- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).\n- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).\n- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).\n- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).\n- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).\n- clk: samsung: Fix kernel-doc comments (git-fixes).\n- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).\n- clk: zynqmp: Add a check for NULL pointer (git-fixes).\n- clk: zynqmp: make bestdiv unsigned (git-fixes).\n- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)\n- coresight: etm4x: Allocate and device assign \u0027struct etmv4_drvdata\u0027 (bsc#1218779)\n- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)\n- coresight: etm4x: Drop iomem \u0027base\u0027 argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)\n- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)\n- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).\n- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).\n- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).\n- crypto: sahara - do not resize req-\u003esrc when doing hash operations (git-fixes).\n- crypto: sahara - fix ahash reqsize (git-fixes).\n- crypto: sahara - fix ahash selftest failure (git-fixes).\n- crypto: sahara - fix cbc selftest failure (git-fixes).\n- crypto: sahara - fix processing hash requests with req-\u003enbytes \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix processing requests with cryptlen \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).\n- crypto: sahara - handle zero-length aes requests (git-fixes).\n- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).\n- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).\n- crypto: scomp - fix req-\u003edst buffer overflow (git-fixes).\n- dma-debug: fix kernel-doc warnings (git-fixes).\n- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).\n- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).\n- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).\n- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).\n- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).\n- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).\n- drivers: clk: zynqmp: update divider round rate logic (git-fixes).\n- drm/amd/display: Fix tiled display misalignment (git-fixes).\n- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).\n- drm/amd/display: add nv12 bounding box (git-fixes).\n- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).\n- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).\n- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).\n- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).\n- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).\n- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).\n- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).\n- drm/amd/powerplay: Fix kzalloc parameter \u0027ATOM_Tonga_PPM_Table\u0027 in \u0027get_platform_power_management_table()\u0027 (git-fixes).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/amdgpu/pm: Fix the power source flag error (git-fixes).\n- drm/amdgpu: Add NULL checks for function pointers (git-fixes).\n- drm/amdgpu: Drop \u0027fence\u0027 check in \u0027to_amdgpu_amdkfd_fence()\u0027 (git-fixes).\n- drm/amdgpu: Fix \u0027*fw\u0027 from request_firmware() not released in \u0027amdgpu_ucode_request()\u0027 (git-fixes).\n- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).\n- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).\n- drm/amdgpu: Fix missing error code in \u0027gmc_v6/7/8/9_0_hw_init()\u0027 (git-fixes).\n- drm/amdgpu: Fix with right return code \u0027-EIO\u0027 in \u0027amdgpu_gmc_vram_checking()\u0027 (git-fixes).\n- drm/amdgpu: Let KFD sync with VM fences (git-fixes).\n- drm/amdgpu: Release \u0027adev-\u003epm.fw\u0027 before return in \u0027amdgpu_device_need_post()\u0027 (git-fixes).\n- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).\n- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).\n- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).\n- drm/amdkfd: Fix \u0027node\u0027 NULL check in \u0027svm_range_get_range_boundaries()\u0027 (git-fixes).\n- drm/amdkfd: Fix iterator used outside loop in \u0027kfd_add_peer_prop()\u0027 (git-fixes).\n- drm/amdkfd: Fix lock dependency warning (git-fixes).\n- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).\n- drm/amdkfd: Use resource_size() helper function (git-fixes).\n- drm/amdkfd: fixes for HMM mem allocation (git-fixes).\n- drm/bridge: Fix typo in post_disable() description (git-fixes).\n- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).\n- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).\n- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).\n- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).\n- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).\n- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).\n- drm/bridge: tc358767: Fix return value on error case (git-fixes).\n- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).\n- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).\n- drm/crtc: fix uninitialized variable use (git-fixes).\n- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).\n- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).\n- drm/exynos: fix a potential error pointer dereference (git-fixes).\n- drm/exynos: fix a wrong error checking (git-fixes).\n- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).\n- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).\n- drm/framebuffer: Fix use of uninitialized variable (git-fixes).\n- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).\n- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).\n- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).\n- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).\n- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).\n- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).\n- drm/msm/dsi: Enable runtime PM (git-fixes).\n- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).\n- drm/msm/mdp4: flush vblank event on disable (git-fixes).\n- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).\n- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).\n- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).\n- drm/panel: nt35510: fix typo (git-fixes).\n- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).\n- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).\n- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).\n- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).\n- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).\n- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).\n- drm/radeon: check return value of radeon_ring_lock() (git-fixes).\n- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).\n- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).\n- drm/tidss: Fix atomic_flush check (git-fixes).\n- drm/tidss: Fix dss reset (git-fixes).\n- drm/tidss: Move reset to the end of dispc_init() (git-fixes).\n- drm/tidss: Return error value from from softreset (git-fixes).\n- drm/tilcdc: Fix irq free on unload (git-fixes).\n- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).\n- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).\n- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).\n- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)\n- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).\n- eventfd: prevent underflow for eventfd semaphores (git-fixes).\n- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).\n- exfat: support handle zero-size directory (git-fixes).\n- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).\n- fbdev: Only disable sysfb on the primary device (bsc#1216441)\n- fbdev: flush deferred IO before closing (git-fixes).\n- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).\n- fbdev: imxfb: fix left margin setting (git-fixes).\n- fbdev: mmp: Fix typo and wording in code comment (git-fixes).\n- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).\n- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).\n- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).\n- fjes: fix memleaks in fjes_hw_setup (git-fixes).\n- fs/mount_setattr: always cleanup mount_kattr (git-fixes).\n- fs: Fix error checking for d_hash_and_lookup() (git-fixes).\n- fs: Move notify_change permission checks into may_setattr (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: drop peer group ids under namespace lock (git-fixes).\n- fs: indicate request originates from old mount API (git-fixes).\n- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).\n- fuse: dax: set fc-\u003edax to NULL in fuse_dax_conn_free() (bsc#1218659).\n- gfs2: Always check inode size of inline inodes (git-fixes).\n- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).\n- gfs2: Disable page faults during lockless buffered reads (git-fixes).\n- gfs2: Eliminate ip-\u003ei_gh (git-fixes).\n- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).\n- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).\n- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).\n- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).\n- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).\n- gfs2: Switch to wait_event in gfs2_logd (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: low-memory forced flush fixes (git-fixes).\n- gfs2: release iopen glock early in evict (git-fixes).\n- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).\n- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).\n- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).\n- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).\n- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).\n- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).\n- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).\n- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).\n- iio: adc: ad9467: do not ignore error codes (git-fixes).\n- iio: adc: ad9467: fix reset gpio handling (git-fixes).\n- ipmi: Use regspacings passed as a module parameter (git-fixes).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)\n- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It\u0027s an internal function that shouldn\u0027t have been exported\n- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).\n- kernel-doc: handle a void function without producing a warning (git-fixes).\n- kernel-source: Fix description typo\n- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).\n- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).\n- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).\n- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).\n- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).\n- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).\n- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).\n- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).\n- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).\n- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).\n- media: pvrusb2: fix use after free on context disconnection (git-fixes).\n- media: rkisp1: Disable runtime PM in probe error path (git-fixes).\n- media: rkisp1: Fix media device memory leak (git-fixes).\n- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).\n- media: videobuf2-dma-sg: fix vmap callback (git-fixes).\n- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).\n- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).\n- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).\n- mmc: core: Cancel delayed work before releasing host (git-fixes).\n- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).\n- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).\n- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).\n- mtd: rawnand: pl353: Fix kernel doc (git-fixes).\n- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).\n- mtd: rawnand: rockchip: Rename a structure (git-fixes).\n- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).\n- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).\n- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).\n- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).\n- net: usb: ax88179_178a: remove redundant init code (git-fixes).\n- net: usb: ax88179_178a: restore state on resume (bsc#1218948).\n- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).\n- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).\n- nsfs: add compat ioctl handler (git-fixes).\n- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).\n- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).\n- nvme-pci: fix sleeping function called from interrupt context (git-fixes).\n- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).\n- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).\n- nvme: fix max_discard_sectors calculation (git-fixes).\n- nvme: introduce helper function to get ctrl state (git-fixes).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- nvme: trace: avoid memcpy overflow warning (git-fixes).\n- nvmet: re-fix tracing strncpy() warning (git-fixes).\n- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).\n- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).\n- parport: parport_serial: Add Brainboxes BAR details (git-fixes).\n- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).\n- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).\n- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).\n- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).\n- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).\n- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).\n- pinctrl: intel: Revert \u0027Unexport intel_pinctrl_probe()\u0027 (git-fixes).\n- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).\n- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).\n- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).\n- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).\n- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).\n- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).\n- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).\n- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).\n- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).\n- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).\n- powerpc/xive: Fix endian conversion size (bsc#1194869).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).\n- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).\n- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).\n- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).\n- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).\n- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).\n- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).\n- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).\n- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).\n- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).\n- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).\n- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest\u0027s APCB (git-fixes bsc#1219014).\n- s390/vfio-ap: loop over the shadow APCB when filtering guest\u0027s AP configuration (git-fixes bsc#1219013).\n- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).\n- s390: vfio-ap: tighten the NIB validity check (git-fixes).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Always send batch on reset or error handling command (git-fixes).\n- scsi: fnic: Return error if vmalloc() failed (git-fixes).\n- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).\n- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).\n- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).\n- scsi: hisi_sas: Rename HISI_SAS_{RESET -\u003e RESETTING}_BIT (git-fixes).\n- scsi: hisi_sas: Replace with standard error code return value (git-fixes).\n- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).\n- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).\n- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).\n- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).\n- scsi: lpfc: Reinitialize an NPIV\u0027s VMID data structures after FDISC (bsc#1219582).\n- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).\n- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix an outdated comment (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (bsc#1219067).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).\n- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).\n- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).\n- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).\n- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).\n- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).\n- serial: imx: Correct clock error message in function probe() (git-fixes).\n- serial: imx: fix tx statemachine deadlock (git-fixes).\n- serial: max310x: fail probe if clock crystal is unstable (git-fixes).\n- serial: max310x: improve crystal stable clock detection (git-fixes).\n- serial: max310x: set default value when reading clock ready bit (git-fixes).\n- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).\n- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).\n- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).\n- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).\n- software node: Let args be NULL in software_node_get_reference_args (git-fixes).\n- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).\n- swiotlb-xen: provide the \u0027max_mapping_size\u0027 method (git-fixes).\n- swiotlb: fix a braino in the alignment check fix (bsc#1216559).\n- swiotlb: fix slot alignment checks (bsc#1216559).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- tracing: Add size check when printing trace_marker output (git-fixes).\n- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).\n- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).\n- tracing: Have large events show up as \u0027[LINE TOO BIG]\u0027 instead of nothing (git-fixes).\n- ubifs: Check @c-\u003edirty_[n|p]n_cnt and @c-\u003enroot state under @c-\u003elp_mutex (git-fixes).\n- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).\n- ubifs: ubifs_symlink: Fix memleak of inode-\u003ei_link in error path (git-fixes).\n- uio: Fix use-after-free in uio_open (git-fixes).\n- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).\n- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).\n- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).\n- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).\n- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).\n- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).\n- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).\n- usb: otg numberpad exception (bsc#1218527).\n- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).\n- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).\n- usb: ucsi: Add missing ppm_lock (git-fixes).\n- usb: ucsi_acpi: Fix command completion handling (git-fixes).\n- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).\n- usr/Kconfig: fix typos of \u0027its\u0027 (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).\n- virtio-mmio: fix memory leak of vm_dev (git-fixes).\n- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).\n- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).\n- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).\n- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).\n- watchdog: set cdev owner before adding (git-fixes).\n- wifi: ath11k: Defer on rproc_get failure (git-fixes).\n- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).\n- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).\n- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).\n- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).\n- wifi: libertas: stop selecting wext (git-fixes).\n- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).\n- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).\n- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).\n- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).\n- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).\n- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).\n- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).\n- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).\n- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).\n- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).\n- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).\n- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).\n- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).\n- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).\n- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).\n- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).\n- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).\n- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).\n- xen/events: fix delayed eoi list handling (git-fixes).\n- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).\n- xhci: cleanup xhci_hub_control port references (git-fixes).\n- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).\n- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-514,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-514,openSUSE-SLE-15.5-2024-514", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0514-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0514-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240514-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0514-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1174649", "url": "https://bugzilla.suse.com/1174649" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1194869", "url": "https://bugzilla.suse.com/1194869" }, { "category": "self", "summary": "SUSE Bug 1209834", "url": "https://bugzilla.suse.com/1209834" }, { "category": "self", "summary": "SUSE Bug 1210443", "url": "https://bugzilla.suse.com/1210443" }, { "category": "self", "summary": "SUSE Bug 1211515", "url": "https://bugzilla.suse.com/1211515" }, { "category": "self", "summary": "SUSE Bug 1212091", "url": "https://bugzilla.suse.com/1212091" }, { "category": "self", "summary": "SUSE Bug 1214377", "url": "https://bugzilla.suse.com/1214377" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1215885", "url": "https://bugzilla.suse.com/1215885" }, { "category": "self", "summary": "SUSE Bug 1216441", "url": "https://bugzilla.suse.com/1216441" }, { "category": "self", "summary": "SUSE Bug 1216559", "url": "https://bugzilla.suse.com/1216559" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217895", "url": "https://bugzilla.suse.com/1217895" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218005", "url": "https://bugzilla.suse.com/1218005" }, { "category": "self", "summary": "SUSE Bug 1218447", "url": "https://bugzilla.suse.com/1218447" }, { "category": "self", "summary": "SUSE Bug 1218527", "url": "https://bugzilla.suse.com/1218527" }, { "category": "self", "summary": "SUSE Bug 1218659", "url": "https://bugzilla.suse.com/1218659" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218723", "url": "https://bugzilla.suse.com/1218723" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218738", "url": "https://bugzilla.suse.com/1218738" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218778", "url": "https://bugzilla.suse.com/1218778" }, { "category": "self", "summary": "SUSE Bug 1218779", "url": "https://bugzilla.suse.com/1218779" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218916", "url": "https://bugzilla.suse.com/1218916" }, { "category": "self", "summary": "SUSE Bug 1218948", "url": "https://bugzilla.suse.com/1218948" }, { "category": "self", "summary": "SUSE Bug 1218958", "url": "https://bugzilla.suse.com/1218958" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1218997", "url": "https://bugzilla.suse.com/1218997" }, { "category": "self", "summary": "SUSE Bug 1219006", "url": "https://bugzilla.suse.com/1219006" }, { "category": "self", "summary": "SUSE Bug 1219012", "url": "https://bugzilla.suse.com/1219012" }, { "category": "self", "summary": "SUSE Bug 1219013", "url": "https://bugzilla.suse.com/1219013" }, { "category": "self", "summary": "SUSE Bug 1219014", "url": "https://bugzilla.suse.com/1219014" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219067", "url": "https://bugzilla.suse.com/1219067" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219136", "url": "https://bugzilla.suse.com/1219136" }, { "category": "self", "summary": "SUSE Bug 1219285", "url": "https://bugzilla.suse.com/1219285" }, { "category": "self", "summary": "SUSE Bug 1219349", "url": "https://bugzilla.suse.com/1219349" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219429", "url": "https://bugzilla.suse.com/1219429" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219490", "url": "https://bugzilla.suse.com/1219490" }, { "category": "self", "summary": "SUSE Bug 1219512", "url": "https://bugzilla.suse.com/1219512" }, { "category": "self", "summary": "SUSE Bug 1219568", "url": "https://bugzilla.suse.com/1219568" }, { "category": "self", "summary": "SUSE Bug 1219582", "url": "https://bugzilla.suse.com/1219582" }, { "category": "self", "summary": "SUSE Bug 1219608", "url": "https://bugzilla.suse.com/1219608" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6531 page", "url": "https://www.suse.com/security/cve/CVE-2023-6531/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0641 page", "url": "https://www.suse.com/security/cve/CVE-2024-0641/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1085 page", "url": "https://www.suse.com/security/cve/CVE-2024-1085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24860 page", "url": "https://www.suse.com/security/cve/CVE-2024-24860/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T14:44:16Z", "generator": { "date": "2024-02-15T14:44:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0514-1", "initial_release_date": "2024-02-15T14:44:16Z", "revision_history": [ { "date": "2024-02-15T14:44:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product": { "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "product": { "name": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "product_id": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.14.21-150500.33.34.1.noarch", "product": { "name": "kernel-source-azure-5.14.21-150500.33.34.1.noarch", "product_id": "kernel-source-azure-5.14.21-150500.33.34.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch" }, "product_reference": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.14.21-150500.33.34.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch" }, "product_reference": "kernel-source-azure-5.14.21-150500.33.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch" }, "product_reference": "kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.14.21-150500.33.34.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch" }, "product_reference": "kernel-source-azure-5.14.21-150500.33.34.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64" }, "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" }, "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6531" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6531", "url": "https://www.suse.com/security/cve/CVE-2023-6531" }, { "category": "external", "summary": "SUSE Bug 1218447 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218447" }, { "category": "external", "summary": "SUSE Bug 1218487 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218487" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2023-6531" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0641" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel\u0027s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0641", "url": "https://www.suse.com/security/cve/CVE-2024-0641" }, { "category": "external", "summary": "SUSE Bug 1218916 for CVE-2024-0641", "url": "https://bugzilla.suse.com/1218916" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2024-0641" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1085" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1085", "url": "https://www.suse.com/security/cve/CVE-2024-1085" }, { "category": "external", "summary": "SUSE Bug 1219429 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219429" }, { "category": "external", "summary": "SUSE Bug 1219432 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "important" } ], "title": "CVE-2024-1086" }, { "cve": "CVE-2024-24860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24860" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24860", "url": "https://www.suse.com/security/cve/CVE-2024-24860" }, { "category": "external", "summary": "SUSE Bug 1219608 for CVE-2024-24860", "url": "https://bugzilla.suse.com/1219608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.34.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.34.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:44:16Z", "details": "moderate" } ], "title": "CVE-2024-24860" } ] }
suse-su-2024:0474-1
Vulnerability from csaf_suse
Published
2024-02-14 17:00
Modified
2024-02-14 17:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
The following non-security bugs were fixed:
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
Patchnames
SUSE-2024-474,SUSE-SLE-Module-Live-Patching-15-SP3-2024-474,SUSE-SLE-Product-HA-15-SP3-2024-474,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-474,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-474,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-474,SUSE-SUSE-MicroOS-5.1-2024-474,SUSE-SUSE-MicroOS-5.2-2024-474,SUSE-Storage-7.1-2024-474
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n\nThe following non-security bugs were fixed:\n\n- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-474,SUSE-SLE-Module-Live-Patching-15-SP3-2024-474,SUSE-SLE-Product-HA-15-SP3-2024-474,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-474,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-474,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-474,SUSE-SUSE-MicroOS-5.1-2024-474,SUSE-SUSE-MicroOS-5.2-2024-474,SUSE-Storage-7.1-2024-474", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0474-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0474-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240474-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0474-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-14T17:00:46Z", "generator": { "date": "2024-02-14T17:00:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0474-1", "initial_release_date": "2024-02-14T17:00:46Z", "revision_history": [ { "date": "2024-02-14T17:00:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.150.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.150.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.150.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.150.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.150.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.150.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.150.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.150.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.150.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.150.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.150.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.150.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.150.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_150-preempt-1-150300.7.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_150-preempt-1-150300.7.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_150-preempt-1-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.150.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.150.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.150.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.150.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.150.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.150.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.150.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.150.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.150.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T17:00:46Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0476-1
Vulnerability from csaf_suse
Published
2024-02-14 18:35
Modified
2024-02-14 18:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c->root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- block: Fix kabi header include (bsc#1218929).
- block: free the extended dev_t minor later (bsc#1218930).
- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).
- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- doc/README.KSYMS: Add to repo.
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kernel-source: Fix description typo
- loop: suppress uevents while reconfiguring the device (git-fixes).
- nbd: Fix debugfs_create_dir error checking (git-fixes).
- nbd: fix incomplete validation of ioctl arg (git-fixes).
- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- null_blk: Always check queue mode setting from configfs (git-fixes).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).
- rbd: decouple header read-in from updating rbd_dev->header (git-fixes).
- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).
- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).
- rbd: harden get_lock_owner_info() a bit (git-fixes).
- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).
- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).
- rbd: move rbd_dev_refresh() definition (git-fixes).
- rbd: prevent busy loop when requesting exclusive lock (git-fixes).
- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).
- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
Patchnames
SUSE-2024-476,SUSE-SLE-Micro-5.3-2024-476,SUSE-SLE-Micro-5.4-2024-476,SUSE-SLE-Module-Live-Patching-15-SP4-2024-476,openSUSE-Leap-Micro-5.3-2024-476,openSUSE-Leap-Micro-5.4-2024-476
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c-\u003eroot in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c-\u003eroot error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- block: Fix kabi header include (bsc#1218929).\n- block: free the extended dev_t minor later (bsc#1218930).\n- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).\n- dm zoned: free dmz-\u003eddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio\u0027s immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- kernel-source: Fix description typo\n- loop: suppress uevents while reconfiguring the device (git-fixes).\n- nbd: Fix debugfs_create_dir error checking (git-fixes).\n- nbd: fix incomplete validation of ioctl arg (git-fixes).\n- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- null_blk: Always check queue mode setting from configfs (git-fixes).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).\n- rbd: decouple header read-in from updating rbd_dev-\u003eheader (git-fixes).\n- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).\n- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).\n- rbd: harden get_lock_owner_info() a bit (git-fixes).\n- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).\n- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).\n- rbd: move rbd_dev_refresh() definition (git-fixes).\n- rbd: prevent busy loop when requesting exclusive lock (git-fixes).\n- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).\n- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-476,SUSE-SLE-Micro-5.3-2024-476,SUSE-SLE-Micro-5.4-2024-476,SUSE-SLE-Module-Live-Patching-15-SP4-2024-476,openSUSE-Leap-Micro-5.3-2024-476,openSUSE-Leap-Micro-5.4-2024-476", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0476-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0476-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240476-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0476-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1177529", "url": "https://bugzilla.suse.com/1177529" }, { "category": "self", "summary": "SUSE Bug 1209834", "url": "https://bugzilla.suse.com/1209834" }, { "category": "self", "summary": "SUSE Bug 1212091", "url": "https://bugzilla.suse.com/1212091" }, { "category": "self", "summary": "SUSE Bug 1215885", "url": "https://bugzilla.suse.com/1215885" }, { "category": "self", "summary": "SUSE Bug 1216016", "url": "https://bugzilla.suse.com/1216016" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217217", "url": "https://bugzilla.suse.com/1217217" }, { "category": "self", "summary": "SUSE Bug 1217670", "url": "https://bugzilla.suse.com/1217670" }, { "category": "self", "summary": "SUSE Bug 1217895", "url": "https://bugzilla.suse.com/1217895" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218916", "url": "https://bugzilla.suse.com/1218916" }, { "category": "self", "summary": "SUSE Bug 1218929", "url": "https://bugzilla.suse.com/1218929" }, { "category": "self", "summary": "SUSE Bug 1218930", "url": "https://bugzilla.suse.com/1218930" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219349", "url": "https://bugzilla.suse.com/1219349" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219429", "url": "https://bugzilla.suse.com/1219429" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219490", "url": "https://bugzilla.suse.com/1219490" }, { "category": "self", "summary": "SUSE Bug 1219608", "url": "https://bugzilla.suse.com/1219608" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0641 page", "url": "https://www.suse.com/security/cve/CVE-2024-0641/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1085 page", "url": "https://www.suse.com/security/cve/CVE-2024-1085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24860 page", "url": "https://www.suse.com/security/cve/CVE-2024-24860/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-14T18:35:28Z", "generator": { "date": "2024-02-14T18:35:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0476-1", "initial_release_date": "2024-02-14T18:35:28Z", "revision_history": [ { "date": "2024-02-14T18:35:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.14.21-150400.15.68.1.noarch", "product": { "name": "kernel-devel-rt-5.14.21-150400.15.68.1.noarch", "product_id": "kernel-devel-rt-5.14.21-150400.15.68.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.14.21-150400.15.68.1.noarch", "product": { "name": "kernel-source-rt-5.14.21-150400.15.68.1.noarch", "product_id": "kernel-source-rt-5.14.21-150400.15.68.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "cluster-md-kmp-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "dlm-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "dlm-kmp-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "gfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-devel-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-devel-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-extra-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-extra-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-livepatch-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-livepatch-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt-optional-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt-optional-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt_debug-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt_debug-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt_debug-devel-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kernel-syms-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "kernel-syms-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "kselftests-kmp-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "ocfs2-kmp-rt-5.14.21-150400.15.68.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.14.21-150400.15.68.1.x86_64", "product_id": "reiserfs-kmp-rt-5.14.21-150400.15.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150400.15.68.1.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150400.15.68.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0641" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel\u0027s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0641", "url": "https://www.suse.com/security/cve/CVE-2024-0641" }, { "category": "external", "summary": "SUSE Bug 1218916 for CVE-2024-0641", "url": "https://bugzilla.suse.com/1218916" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2024-0641" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1085" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1085", "url": "https://www.suse.com/security/cve/CVE-2024-1085" }, { "category": "external", "summary": "SUSE Bug 1219429 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219429" }, { "category": "external", "summary": "SUSE Bug 1219432 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "important" } ], "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "important" } ], "title": "CVE-2024-1086" }, { "cve": "CVE-2024-24860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24860" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24860", "url": "https://www.suse.com/security/cve/CVE-2024-24860" }, { "category": "external", "summary": "SUSE Bug 1219608 for CVE-2024-24860", "url": "https://bugzilla.suse.com/1219608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.68.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T18:35:28Z", "details": "moderate" } ], "title": "CVE-2024-24860" } ] }
suse-su-2024:0515-1
Vulnerability from csaf_suse
Published
2024-02-15 14:45
Modified
2024-02-15 14:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c->root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- block: Fix kabi header include (bsc#1218929).
- block: free the extended dev_t minor later (bsc#1218930).
- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).
- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- doc/README.KSYMS: Add to repo.
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- loop: suppress uevents while reconfiguring the device (git-fixes).
- nbd: Fix debugfs_create_dir error checking (git-fixes).
- nbd: fix incomplete validation of ioctl arg (git-fixes).
- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- null_blk: Always check queue mode setting from configfs (git-fixes).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).
- rbd: decouple header read-in from updating rbd_dev->header (git-fixes).
- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).
- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).
- rbd: harden get_lock_owner_info() a bit (git-fixes).
- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).
- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).
- rbd: move rbd_dev_refresh() definition (git-fixes).
- rbd: prevent busy loop when requesting exclusive lock (git-fixes).
- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).
- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
Patchnames
SUSE-2024-515,SUSE-SLE-Micro-5.3-2024-515,SUSE-SLE-Micro-5.4-2024-515,SUSE-SLE-Module-Live-Patching-15-SP4-2024-515,SUSE-SLE-Product-HA-15-SP4-2024-515,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-515,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-515,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-515,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-515,openSUSE-Leap-Micro-5.3-2024-515,openSUSE-Leap-Micro-5.4-2024-515
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c-\u003eroot in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c-\u003eroot error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- block: Fix kabi header include (bsc#1218929).\n- block: free the extended dev_t minor later (bsc#1218930).\n- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).\n- dm zoned: free dmz-\u003eddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio\u0027s immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- loop: suppress uevents while reconfiguring the device (git-fixes).\n- nbd: Fix debugfs_create_dir error checking (git-fixes).\n- nbd: fix incomplete validation of ioctl arg (git-fixes).\n- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- null_blk: Always check queue mode setting from configfs (git-fixes).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).\n- rbd: decouple header read-in from updating rbd_dev-\u003eheader (git-fixes).\n- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).\n- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).\n- rbd: harden get_lock_owner_info() a bit (git-fixes).\n- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).\n- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).\n- rbd: move rbd_dev_refresh() definition (git-fixes).\n- rbd: prevent busy loop when requesting exclusive lock (git-fixes).\n- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).\n- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-515,SUSE-SLE-Micro-5.3-2024-515,SUSE-SLE-Micro-5.4-2024-515,SUSE-SLE-Module-Live-Patching-15-SP4-2024-515,SUSE-SLE-Product-HA-15-SP4-2024-515,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-515,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-515,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-515,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-515,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-515,openSUSE-Leap-Micro-5.3-2024-515,openSUSE-Leap-Micro-5.4-2024-515", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0515-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0515-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240515-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0515-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1177529", "url": "https://bugzilla.suse.com/1177529" }, { "category": "self", "summary": "SUSE Bug 1209834", "url": "https://bugzilla.suse.com/1209834" }, { "category": "self", "summary": "SUSE Bug 1212091", "url": "https://bugzilla.suse.com/1212091" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1215885", "url": "https://bugzilla.suse.com/1215885" }, { "category": "self", "summary": "SUSE Bug 1216016", "url": "https://bugzilla.suse.com/1216016" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217217", "url": "https://bugzilla.suse.com/1217217" }, { "category": "self", "summary": "SUSE Bug 1217670", "url": "https://bugzilla.suse.com/1217670" }, { "category": "self", "summary": "SUSE Bug 1217895", "url": "https://bugzilla.suse.com/1217895" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218916", "url": "https://bugzilla.suse.com/1218916" }, { "category": "self", "summary": "SUSE Bug 1218929", "url": "https://bugzilla.suse.com/1218929" }, { "category": "self", "summary": "SUSE Bug 1218930", "url": "https://bugzilla.suse.com/1218930" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219349", "url": "https://bugzilla.suse.com/1219349" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219429", "url": "https://bugzilla.suse.com/1219429" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219490", "url": "https://bugzilla.suse.com/1219490" }, { "category": "self", "summary": "SUSE Bug 1219608", "url": "https://bugzilla.suse.com/1219608" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0641 page", "url": "https://www.suse.com/security/cve/CVE-2024-0641/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1085 page", "url": "https://www.suse.com/security/cve/CVE-2024-1085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24860 page", "url": "https://www.suse.com/security/cve/CVE-2024-24860/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T14:45:50Z", "generator": { "date": "2024-02-15T14:45:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0515-1", "initial_release_date": "2024-02-15T14:45:50Z", "revision_history": [ { "date": "2024-02-15T14:45:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "dlm-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "dlm-kmp-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-allwinner-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-allwinner-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-altera-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-altera-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-amazon-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-amazon-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-amazon-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-amd-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-amd-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-amlogic-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-amlogic-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-apm-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-apm-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-apple-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-apple-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-apple-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-arm-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-arm-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-broadcom-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-broadcom-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-cavium-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-cavium-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-exynos-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-exynos-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-freescale-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-freescale-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-hisilicon-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-hisilicon-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-lg-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-lg-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-marvell-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-marvell-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-mediatek-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-mediatek-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-nvidia-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-nvidia-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-qcom-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-qcom-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-renesas-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-renesas-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-rockchip-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-rockchip-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-socionext-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-socionext-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-sprd-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-sprd-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.14.21-150400.24.108.1.aarch64", "product": { "name": "dtb-xilinx-5.14.21-150400.24.108.1.aarch64", "product_id": "dtb-xilinx-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "gfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-64kb-extra-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-64kb-extra-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-64kb-optional-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-64kb-optional-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "product": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "product_id": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-extra-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-extra-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-livepatch-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-default-optional-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-default-optional-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-kvmsmall-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-obs-qa-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kernel-syms-5.14.21-150400.24.108.1.aarch64", "product_id": "kernel-syms-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "kselftests-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "kselftests-kmp-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.14.21-150400.24.108.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.108.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-devel-5.14.21-150400.24.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-docs-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-docs-5.14.21-150400.24.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-docs-html-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-docs-html-5.14.21-150400.24.108.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-macros-5.14.21-150400.24.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-source-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-source-5.14.21-150400.24.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.21-150400.24.108.1.noarch", "product": { "name": "kernel-source-vanilla-5.14.21-150400.24.108.1.noarch", "product_id": "kernel-source-vanilla-5.14.21-150400.24.108.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-debug-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-debug-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-debug-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-debug-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "product": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "product_id": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-extra-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-extra-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-default-optional-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-default-optional-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-kvmsmall-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-obs-qa-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kernel-syms-5.14.21-150400.24.108.1.ppc64le", "product_id": "kernel-syms-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "kselftests-kmp-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "dlm-kmp-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "gfs2-kmp-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-devel-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-extra-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-extra-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-livepatch-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-default-optional-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-default-optional-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "product_id": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-obs-build-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-obs-qa-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-syms-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-syms-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "product": { "name": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "product_id": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "kselftests-kmp-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "dlm-kmp-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-debug-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-debug-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-debug-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-debug-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "product": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "product_id": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-extra-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-extra-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-default-optional-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-default-optional-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-kvmsmall-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-obs-qa-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "product_id": "kernel-syms-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "kselftests-kmp-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.108.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.108.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.108.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.aarch64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.s390x as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.s390x", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.108.1.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.108.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0641" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel\u0027s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0641", "url": "https://www.suse.com/security/cve/CVE-2024-0641" }, { "category": "external", "summary": "SUSE Bug 1218916 for CVE-2024-0641", "url": "https://bugzilla.suse.com/1218916" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2024-0641" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1085" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1085", "url": "https://www.suse.com/security/cve/CVE-2024-1085" }, { "category": "external", "summary": "SUSE Bug 1219429 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219429" }, { "category": "external", "summary": "SUSE Bug 1219432 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "important" } ], "title": "CVE-2024-1086" }, { "cve": "CVE-2024-24860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24860" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24860", "url": "https://www.suse.com/security/cve/CVE-2024-24860" }, { "category": "external", "summary": "SUSE Bug 1219608 for CVE-2024-24860", "url": "https://bugzilla.suse.com/1219608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.ppc64le", "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.ppc64le", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.s390x", "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.108.1.x86_64", "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.108.1.noarch", "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.108.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T14:45:50Z", "details": "moderate" } ], "title": "CVE-2024-24860" } ] }
suse-su-2024:0483-1
Vulnerability from csaf_suse
Published
2024-02-15 12:49
Modified
2024-02-15 12:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713)
- 9p: missing chunk of 'fs/9p: Do not update file type when updating file attributes' (git-fixes).
- ACPICA: Avoid cache flush inside virtual machines (git-fixes).
- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).
- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).
- acpi/nfit: improve bounds checking for 'func' (git-fixes).
- affs: fix basic permission bits to actually work (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- asix: Add check for usbnet_get_endpoints (git-fixes).
- bnxt_en: Log unknown link speed appropriately (git-fixes).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).
- chardev: fix error handling in cdev_device_add() (git-fixes).
- configfs: fix a deadlock in configfs_symlink() (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).
- configfs: fix memleak in configfs_release_bin_file (git-fixes).
- configfs: new object reprsenting tree fragments (git-fixes).
- configfs: provide exclusion between IO and removals (git-fixes).
- configfs: stash the data we need into configfs_buffer at open time (git-fixes).
- ext4: Avoid freeing inodes on dirty list (bsc#1216989).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).
- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).
- fs/file.c: initialize init_files.resize_wait (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).
- fs: ratelimit __find_get_block_slow() failure message (git-fixes).
- fs: warn about impending deprecation of mandatory locks (git-fixes).
- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Do not call dlm after protocol is unmounted (git-fixes).
- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).
- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix lru_count going negative (git-fixes).
- gfs2: Fix marking bitmaps non-full (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).
- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).
- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Special-case rindex for gfs2_grow (git-fixes).
- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).
- gfs2: add validation checks for size of superblock (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).
- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).
- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).
- gfs2: fix use-after-free on transaction ail lists (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).
- gfs2: report 'already frozen/thawed' errors (git-fixes).
- gfs2: take jdata unstuff into account in do_grow (git-fixes).
- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).
- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).
- help_next should increase position index (git-fixes).
- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).
- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).
- kernfs: bring names in comments in line with code (git-fixes).
- kernfs: fix use-after-free in __kernfs_remove (git-fixes).
- libceph: use kernel_connect() (bsc#1219446).
- libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes).
- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).
- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (git-fixes).
- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).
- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).
- libnvdimm/region: Fix label activation vs errors (git-fixes).
- libnvdimm: Fix compilation warnings with W=1 (git-fixes).
- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).
- libnvdimm: Validate command family indices (git-fixes).
- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).
- locks: print a warning when mount fails due to lack of 'mand' support (git-fixes).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases.
- mlx4: handle non-napi callers to napi_poll (git-fixes).
- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).
- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).
- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).
- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net: (cpts) fix a missing check of clk_prepare (git-fixes).
- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).
- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).
- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).
- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).
- net: ethernet: ti: fix possible object reference leak (git-fixes).
- net: fec: Do not use netdev messages too early (git-fixes).
- net: ks8851: Delay requesting IRQ until opened (git-fixes).
- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).
- net: ks8851: Set initial carrier state to down (git-fixes).
- net: macb: Add null check for PCLK and HCLK (git-fixed).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).
- net: mvneta: fix double free of txq->buf (git-fixes).
- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).
- net: phylink: avoid resolving link state too early (git-fixes).
- net: sfp: do not probe SFP module before we're attached (git-fixes).
- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).
- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).
- net: stmmac: do not overwrite discard_frame status (git-fixes).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).
- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).
- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).
- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).
- net: systemport: Fix reception of BPDUs (git-fixes).
- net: xilinx: fix possible object reference leak (git-fixed).
- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).
- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: fix orangefs df output (git-fixes).
- orangefs: rate limit the client not running info message (git-fixes).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).
- preserve KABI for struct plat_stmmacenet_data (git-fixes).
- preserve KABI for struct sfp_socket_ops (git-fixes).
- proc: fix /proc/*/map_files lookup (git-fixes).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).
- pstore/ram: Run without kernel crash dump region (git-fixes).
- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- r8169: fix data corruption issue on RTL8402 (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152).
- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).
- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- veth: Fixing transmit return status for dropped packets (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- writeback: Export inode_io_list_del() (bsc#1216989).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).
- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).
- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).
- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (git-fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).
- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- x86: Clear .brk area at early boot (git-fixes).
- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).
- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).
- x86: Mark stop_this_cpu() __noreturn (git-fixes).
- x86: Pin task-stack in __get_wchan() (git-fixes).
- x86: __always_inline __{rd,wr}msr() (git-fixes).
Patchnames
SUSE-2024-483,SUSE-SLE-SERVER-12-SP5-2024-483
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713)\n- 9p: missing chunk of \u0027fs/9p: Do not update file type when updating file attributes\u0027 (git-fixes).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).\n- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).\n- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).\n- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).\n- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).\n- acpi/nfit: improve bounds checking for \u0027func\u0027 (git-fixes).\n- affs: fix basic permission bits to actually work (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- bnxt_en: Log unknown link speed appropriately (git-fixes).\n- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).\n- chardev: fix error handling in cdev_device_add() (git-fixes).\n- configfs: fix a deadlock in configfs_symlink() (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).\n- configfs: fix memleak in configfs_release_bin_file (git-fixes).\n- configfs: new object reprsenting tree fragments (git-fixes).\n- configfs: provide exclusion between IO and removals (git-fixes).\n- configfs: stash the data we need into configfs_buffer at open time (git-fixes).\n- ext4: Avoid freeing inodes on dirty list (bsc#1216989).\n- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).\n- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).\n- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).\n- fs/file.c: initialize init_files.resize_wait (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).\n- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).\n- fs: ratelimit __find_get_block_slow() failure message (git-fixes).\n- fs: warn about impending deprecation of mandatory locks (git-fixes).\n- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).\n- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).\n- gfs2: Do not call dlm after protocol is unmounted (git-fixes).\n- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).\n- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).\n- gfs2: Fix inode height consistency check (git-fixes).\n- gfs2: Fix lru_count going negative (git-fixes).\n- gfs2: Fix marking bitmaps non-full (git-fixes).\n- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).\n- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).\n- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).\n- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).\n- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).\n- gfs2: Special-case rindex for gfs2_grow (git-fixes).\n- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).\n- gfs2: add validation checks for size of superblock (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).\n- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).\n- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).\n- gfs2: fix use-after-free on transaction ail lists (git-fixes).\n- gfs2: ignore negated quota changes (git-fixes).\n- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).\n- gfs2: report \u0027already frozen/thawed\u0027 errors (git-fixes).\n- gfs2: take jdata unstuff into account in do_grow (git-fixes).\n- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).\n- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).\n- help_next should increase position index (git-fixes).\n- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).\n- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).\n- kernfs: bring names in comments in line with code (git-fixes).\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- libceph: use kernel_connect() (bsc#1219446).\n- libnvdimm/btt: Fix LBA masking during \u0027free list\u0027 population (git-fixes).\n- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).\n- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (git-fixes).\n- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).\n- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).\n- libnvdimm/region: Fix label activation vs errors (git-fixes).\n- libnvdimm: Fix compilation warnings with W=1 (git-fixes).\n- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).\n- libnvdimm: Validate command family indices (git-fixes).\n- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).\n- locks: print a warning when mount fails due to lack of \u0027mand\u0027 support (git-fixes).\n- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).\n- mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases.\n- mlx4: handle non-napi callers to napi_poll (git-fixes).\n- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).\n- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).\n- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).\n- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net: (cpts) fix a missing check of clk_prepare (git-fixes).\n- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).\n- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).\n- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).\n- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).\n- net: ethernet: ti: fix possible object reference leak (git-fixes).\n- net: fec: Do not use netdev messages too early (git-fixes).\n- net: ks8851: Delay requesting IRQ until opened (git-fixes).\n- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).\n- net: ks8851: Set initial carrier state to down (git-fixes).\n- net: macb: Add null check for PCLK and HCLK (git-fixed).\n- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).\n- net: phylink: avoid resolving link state too early (git-fixes).\n- net: sfp: do not probe SFP module before we\u0027re attached (git-fixes).\n- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).\n- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).\n- net: stmmac: do not overwrite discard_frame status (git-fixes).\n- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).\n- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).\n- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).\n- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).\n- net: systemport: Fix reception of BPDUs (git-fixes).\n- net: xilinx: fix possible object reference leak (git-fixed).\n- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).\n- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).\n- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).\n- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).\n- orangefs: fix orangefs df output (git-fixes).\n- orangefs: rate limit the client not running info message (git-fixes).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).\n- preserve KABI for struct plat_stmmacenet_data (git-fixes).\n- preserve KABI for struct sfp_socket_ops (git-fixes).\n- proc: fix /proc/*/map_files lookup (git-fixes).\n- pstore/ram: Check start of empty przs during init (git-fixes).\n- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).\n- pstore/ram: Run without kernel crash dump region (git-fixes).\n- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- r8169: fix data corruption issue on RTL8402 (git-fixes).\n- reiserfs: Check the return value from __getblk() (git-fixes).\n- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152).\n- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).\n- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).\n- statfs: enforce statfs[64] structure initialization (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).\n- veth: Fixing transmit return status for dropped packets (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- writeback: Export inode_io_list_del() (bsc#1216989).\n- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).\n- x86/alternatives: Sync core before enabling interrupts (git-fixes).\n- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).\n- x86/bugs: Add \u0027unknown\u0027 reporting for MMIO Stale Data (git-fixes).\n- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).\n- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).\n- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).\n- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).\n- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).\n- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).\n- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).\n- x86/lib: Fix overflow when counting digits (git-fixes).\n- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).\n- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).\n- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).\n- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).\n- x86/pat: Fix x86_has_pat_wp() (git-fixes).\n- x86/pat: Pass valid address to sanitize_phys() (git-fixes).\n- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).\n- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).\n- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).\n- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).\n- x86/topology: Fix duplicated core ID within a package (git-fixes).\n- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).\n- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).\n- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).\n- x86: Clear .brk area at early boot (git-fixes).\n- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).\n- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).\n- x86: Mark stop_this_cpu() __noreturn (git-fixes).\n- x86: Pin task-stack in __get_wchan() (git-fixes).\n- x86: __always_inline __{rd,wr}msr() (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-483,SUSE-SLE-SERVER-12-SP5-2024-483", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0483-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0483-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240483-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0483-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1123986", "url": "https://bugzilla.suse.com/1123986" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1206889", "url": "https://bugzilla.suse.com/1206889" }, { "category": "self", "summary": "SUSE Bug 1212152", "url": "https://bugzilla.suse.com/1212152" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1216989", "url": "https://bugzilla.suse.com/1216989" }, { "category": "self", "summary": "SUSE Bug 1217525", "url": "https://bugzilla.suse.com/1217525" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1219022", "url": "https://bugzilla.suse.com/1219022" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219445", "url": "https://bugzilla.suse.com/1219445" }, { "category": "self", "summary": "SUSE Bug 1219446", "url": "https://bugzilla.suse.com/1219446" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T12:49:30Z", "generator": { "date": "2024-02-15T12:49:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0483-1", "initial_release_date": "2024-02-15T12:49:30Z", "revision_history": [ { "date": "2024-02-15T12:49:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.168.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.168.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.168.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.168.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.168.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.168.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.168.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.168.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.168.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.168.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.168.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.168.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.168.1.x86_64", "product_id": "kernel-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.168.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.168.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.168.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.168.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.168.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.168.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.168.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.168.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.168.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.168.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.168.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.168.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.168.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.168.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.168.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.168.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.168.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.168.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.168.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.168.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.168.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.168.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.168.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T12:49:30Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0469-1
Vulnerability from csaf_suse
Published
2024-02-14 12:19
Modified
2024-02-14 12:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
The following non-security bugs were fixed:
- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -> 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- Update patch reference for ax88179 fix (bsc#1218948)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req->src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen < sg->length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req->dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip->i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernel-source: Fix description typo
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases.
- mkspec: Use variant in constraints template Constraints are not applied consistently with kernel package variants. Add variant to the constraints template as appropriate, and expand it in mkspec.
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- s390: vfio-ap: tighten the NIB validity check (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
Patchnames
SUSE-2024-469,SUSE-SLE-Micro-5.5-2024-469,SUSE-SLE-Module-Live-Patching-15-SP5-2024-469,SUSE-SLE-Module-RT-15-SP5-2024-469,openSUSE-SLE-15.5-2024-469
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).\n\nThe following non-security bugs were fixed:\n\n- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).\n- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).\n- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)\n- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).\n- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)\n- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).\n- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).\n- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)\n- ACPI: video: check for error while searching for backlight device parent (git-fixes).\n- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).\n- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).\n- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).\n- ALSA: hda: Refer to correct stream index at loops (git-fixes).\n- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).\n- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).\n- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).\n- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).\n- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).\n- ASoC: amd: Add check for acp config flags (bsc#1219136).\n- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).\n- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).\n- ASoC: amd: Drop empty platform remove function (bsc#1219136).\n- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).\n- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).\n- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).\n- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).\n- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).\n- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).\n- ASoC: amd: acp: Add new cpu dai\u0027s in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).\n- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).\n- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).\n- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).\n- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).\n- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).\n- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).\n- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).\n- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).\n- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).\n- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).\n- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).\n- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).\n- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).\n- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).\n- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).\n- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).\n- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).\n- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).\n- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).\n- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).\n- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).\n- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).\n- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).\n- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).\n- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).\n- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).\n- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).\n- ASoC: amd: add acp6.2 irq handler (bsc#1219136).\n- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).\n- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).\n- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).\n- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).\n- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).\n- ASoC: amd: fix ACP version typo mistake (bsc#1219136).\n- ASoC: amd: fix spelling mistake: \u0027i.e\u0027 -\u003e \u0027i.e.\u0027 (bsc#1219136).\n- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).\n- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).\n- ASoC: amd: ps: Update copyright notice (bsc#1219136).\n- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).\n- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).\n- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).\n- ASoC: amd: ps: move irq handler registration (bsc#1219136).\n- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).\n- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).\n- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).\n- ASoC: amd: ps: remove unused variable (bsc#1219136).\n- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).\n- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).\n- ASoC: amd: ps: update the acp clock source (bsc#1219136).\n- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).\n- ASoC: amd: ps: use static function (bsc#1219136).\n- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).\n- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).\n- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).\n- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).\n- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).\n- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).\n- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).\n- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).\n- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).\n- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).\n- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).\n- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).\n- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).\n- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).\n- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).\n- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).\n- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).\n- ASoC: cs43130: Fix the position of const qualifier (git-fixes).\n- ASoC: da7219: Support low DC impedance headset (git-fixes).\n- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).\n- ASoC: ops: add correct range check for limiting volume (git-fixes).\n- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).\n- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).\n- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).\n- ASoC: wm8974: Correct boost mixer inputs (git-fixes).\n- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).\n- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).\n- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).\n- Documentation: Begin a RAS section (jsc#PED-7622).\n- EDAC/amd64: Add context struct (jsc#PED-7615).\n- EDAC/amd64: Add get_err_info() to pvt-\u003eops (jsc#PED-7615).\n- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).\n- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).\n- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).\n- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).\n- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).\n- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).\n- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).\n- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).\n- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).\n- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).\n- EDAC/amd64: Remove module version string (jsc#PED-7615).\n- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).\n- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).\n- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).\n- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).\n- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).\n- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).\n- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).\n- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).\n- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).\n- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)\n- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).\n- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).\n- IB/iser: Prevent invalidating wrong MR (git-fixes)\n- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).\n- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).\n- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).\n- Input: xpad - add Razer Wolverine V2 support (git-fixes).\n- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).\n- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).\n- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)\n- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).\n- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).\n- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).\n- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).\n- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)\n- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)\n- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)\n- RDMA/irdma: Add wait for suspend on SQD (git-fixes)\n- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)\n- RDMA/irdma: Do not modify to SQD on error (git-fixes)\n- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)\n- RDMA/irdma: Refactor error handling in create CQP (git-fixes)\n- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)\n- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)\n- RDMA/rtrs-clt: Start hb after path_up (git-fixes)\n- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)\n- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)\n- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)\n- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)\n- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)\n- USB: xhci: workaround for grace period (git-fixes).\n- Update config files: enable ASoC AMD PS drivers (bsc#1219136)\n- Update patch reference for ax88179 fix (bsc#1218948)\n- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- apparmor: avoid crash when parsed profile name is empty (git-fixes).\n- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)\n- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.\n- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)\n- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)\n- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)\n- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)\n- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)\n- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)\n- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)\n- arm64: module: move find_section to header (jsc#PED-4729)\n- arm64: vdso: Fix \u0027no previous prototype\u0027 warning (jsc#PED-4729)\n- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)\n- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- attr: block mode changes of symlinks (git-fixes).\n- badblocks: add helper routines for badblock ranges handling (bsc#1174649).\n- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).\n- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).\n- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).\n- badblocks: switch to the improved badblock handling code (bsc#1174649).\n- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).\n- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).\n- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).\n- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).\n- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).\n- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).\n- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).\n- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).\n- clk: samsung: Fix kernel-doc comments (git-fixes).\n- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).\n- clk: zynqmp: Add a check for NULL pointer (git-fixes).\n- clk: zynqmp: make bestdiv unsigned (git-fixes).\n- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)\n- coresight: etm4x: Allocate and device assign \u0027struct etmv4_drvdata\u0027 (bsc#1218779)\n- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)\n- coresight: etm4x: Drop iomem \u0027base\u0027 argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)\n- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)\n- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).\n- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).\n- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).\n- crypto: sahara - do not resize req-\u003esrc when doing hash operations (git-fixes).\n- crypto: sahara - fix ahash reqsize (git-fixes).\n- crypto: sahara - fix ahash selftest failure (git-fixes).\n- crypto: sahara - fix cbc selftest failure (git-fixes).\n- crypto: sahara - fix processing hash requests with req-\u003enbytes \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix processing requests with cryptlen \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).\n- crypto: sahara - handle zero-length aes requests (git-fixes).\n- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).\n- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).\n- crypto: scomp - fix req-\u003edst buffer overflow (git-fixes).\n- dma-debug: fix kernel-doc warnings (git-fixes).\n- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).\n- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).\n- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).\n- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).\n- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).\n- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).\n- drivers: clk: zynqmp: update divider round rate logic (git-fixes).\n- drm/amd/display: Fix tiled display misalignment (git-fixes).\n- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).\n- drm/amd/display: add nv12 bounding box (git-fixes).\n- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).\n- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).\n- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).\n- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).\n- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).\n- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).\n- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).\n- drm/amd/powerplay: Fix kzalloc parameter \u0027ATOM_Tonga_PPM_Table\u0027 in \u0027get_platform_power_management_table()\u0027 (git-fixes).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/amdgpu/pm: Fix the power source flag error (git-fixes).\n- drm/amdgpu: Add NULL checks for function pointers (git-fixes).\n- drm/amdgpu: Drop \u0027fence\u0027 check in \u0027to_amdgpu_amdkfd_fence()\u0027 (git-fixes).\n- drm/amdgpu: Fix \u0027*fw\u0027 from request_firmware() not released in \u0027amdgpu_ucode_request()\u0027 (git-fixes).\n- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).\n- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).\n- drm/amdgpu: Fix missing error code in \u0027gmc_v6/7/8/9_0_hw_init()\u0027 (git-fixes).\n- drm/amdgpu: Fix with right return code \u0027-EIO\u0027 in \u0027amdgpu_gmc_vram_checking()\u0027 (git-fixes).\n- drm/amdgpu: Let KFD sync with VM fences (git-fixes).\n- drm/amdgpu: Release \u0027adev-\u003epm.fw\u0027 before return in \u0027amdgpu_device_need_post()\u0027 (git-fixes).\n- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).\n- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).\n- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).\n- drm/amdkfd: Fix \u0027node\u0027 NULL check in \u0027svm_range_get_range_boundaries()\u0027 (git-fixes).\n- drm/amdkfd: Fix iterator used outside loop in \u0027kfd_add_peer_prop()\u0027 (git-fixes).\n- drm/amdkfd: Fix lock dependency warning (git-fixes).\n- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).\n- drm/amdkfd: Use resource_size() helper function (git-fixes).\n- drm/amdkfd: fixes for HMM mem allocation (git-fixes).\n- drm/bridge: Fix typo in post_disable() description (git-fixes).\n- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).\n- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).\n- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).\n- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).\n- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).\n- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).\n- drm/bridge: tc358767: Fix return value on error case (git-fixes).\n- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).\n- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).\n- drm/crtc: fix uninitialized variable use (git-fixes).\n- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).\n- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).\n- drm/exynos: fix a potential error pointer dereference (git-fixes).\n- drm/exynos: fix a wrong error checking (git-fixes).\n- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).\n- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).\n- drm/framebuffer: Fix use of uninitialized variable (git-fixes).\n- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).\n- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).\n- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).\n- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).\n- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).\n- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).\n- drm/msm/dsi: Enable runtime PM (git-fixes).\n- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).\n- drm/msm/mdp4: flush vblank event on disable (git-fixes).\n- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).\n- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).\n- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).\n- drm/panel: nt35510: fix typo (git-fixes).\n- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).\n- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).\n- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).\n- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).\n- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).\n- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).\n- drm/radeon: check return value of radeon_ring_lock() (git-fixes).\n- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).\n- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).\n- drm/tidss: Fix atomic_flush check (git-fixes).\n- drm/tidss: Fix dss reset (git-fixes).\n- drm/tidss: Move reset to the end of dispc_init() (git-fixes).\n- drm/tidss: Return error value from from softreset (git-fixes).\n- drm/tilcdc: Fix irq free on unload (git-fixes).\n- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).\n- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).\n- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).\n- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)\n- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).\n- eventfd: prevent underflow for eventfd semaphores (git-fixes).\n- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).\n- exfat: support handle zero-size directory (git-fixes).\n- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).\n- fbdev: Only disable sysfb on the primary device (bsc#1216441)\n- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.\n- fbdev: flush deferred IO before closing (git-fixes).\n- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).\n- fbdev: imxfb: fix left margin setting (git-fixes).\n- fbdev: mmp: Fix typo and wording in code comment (git-fixes).\n- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).\n- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).\n- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).\n- fjes: fix memleaks in fjes_hw_setup (git-fixes).\n- fs/mount_setattr: always cleanup mount_kattr (git-fixes).\n- fs: Fix error checking for d_hash_and_lookup() (git-fixes).\n- fs: Move notify_change permission checks into may_setattr (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: drop peer group ids under namespace lock (git-fixes).\n- fs: indicate request originates from old mount API (git-fixes).\n- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).\n- fuse: dax: set fc-\u003edax to NULL in fuse_dax_conn_free() (bsc#1218659).\n- gfs2: Always check inode size of inline inodes (git-fixes).\n- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).\n- gfs2: Disable page faults during lockless buffered reads (git-fixes).\n- gfs2: Eliminate ip-\u003ei_gh (git-fixes).\n- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).\n- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).\n- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).\n- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).\n- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).\n- gfs2: Switch to wait_event in gfs2_logd (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: low-memory forced flush fixes (git-fixes).\n- gfs2: release iopen glock early in evict (git-fixes).\n- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).\n- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).\n- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).\n- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).\n- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).\n- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).\n- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).\n- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).\n- iio: adc: ad9467: do not ignore error codes (git-fixes).\n- iio: adc: ad9467: fix reset gpio handling (git-fixes).\n- ipmi: Use regspacings passed as a module parameter (git-fixes).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)\n- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It\u0027s an internal function that shouldn\u0027t have been exported\n- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).\n- kernel-doc: handle a void function without producing a warning (git-fixes).\n- kernel-source: Fix description typo\n- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).\n- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).\n- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).\n- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).\n- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).\n- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).\n- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).\n- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).\n- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).\n- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).\n- media: pvrusb2: fix use after free on context disconnection (git-fixes).\n- media: rkisp1: Disable runtime PM in probe error path (git-fixes).\n- media: rkisp1: Fix media device memory leak (git-fixes).\n- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).\n- media: videobuf2-dma-sg: fix vmap callback (git-fixes).\n- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).\n- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).\n- mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases.\n- mkspec: Use variant in constraints template Constraints are not applied consistently with kernel package variants. Add variant to the constraints template as appropriate, and expand it in mkspec.\n- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).\n- mmc: core: Cancel delayed work before releasing host (git-fixes).\n- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).\n- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).\n- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).\n- mtd: rawnand: pl353: Fix kernel doc (git-fixes).\n- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).\n- mtd: rawnand: rockchip: Rename a structure (git-fixes).\n- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).\n- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).\n- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).\n- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).\n- net: usb: ax88179_178a: remove redundant init code (git-fixes).\n- net: usb: ax88179_178a: restore state on resume (bsc#1218948).\n- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).\n- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).\n- nsfs: add compat ioctl handler (git-fixes).\n- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).\n- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).\n- nvme-pci: fix sleeping function called from interrupt context (git-fixes).\n- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).\n- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).\n- nvme: fix max_discard_sectors calculation (git-fixes).\n- nvme: introduce helper function to get ctrl state (git-fixes).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- nvme: trace: avoid memcpy overflow warning (git-fixes).\n- nvmet: re-fix tracing strncpy() warning (git-fixes).\n- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).\n- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).\n- parport: parport_serial: Add Brainboxes BAR details (git-fixes).\n- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).\n- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).\n- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).\n- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).\n- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).\n- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).\n- pinctrl: intel: Revert \u0027Unexport intel_pinctrl_probe()\u0027 (git-fixes).\n- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).\n- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).\n- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).\n- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).\n- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).\n- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).\n- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).\n- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).\n- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).\n- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).\n- powerpc/xive: Fix endian conversion size (bsc#1194869).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).\n- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).\n- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).\n- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).\n- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).\n- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).\n- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).\n- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).\n- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).\n- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).\n- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).\n- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest\u0027s APCB (git-fixes bsc#1219014).\n- s390/vfio-ap: loop over the shadow APCB when filtering guest\u0027s AP configuration (git-fixes bsc#1219013).\n- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).\n- s390: vfio-ap: tighten the NIB validity check (git-fixes).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Always send batch on reset or error handling command (git-fixes).\n- scsi: fnic: Return error if vmalloc() failed (git-fixes).\n- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).\n- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).\n- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).\n- scsi: hisi_sas: Rename HISI_SAS_{RESET -\u003e RESETTING}_BIT (git-fixes).\n- scsi: hisi_sas: Replace with standard error code return value (git-fixes).\n- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).\n- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).\n- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).\n- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).\n- scsi: lpfc: Reinitialize an NPIV\u0027s VMID data structures after FDISC (bsc#1219582).\n- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).\n- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix an outdated comment (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (bsc#1219067).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).\n- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).\n- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).\n- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).\n- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).\n- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).\n- serial: imx: Correct clock error message in function probe() (git-fixes).\n- serial: imx: fix tx statemachine deadlock (git-fixes).\n- serial: max310x: fail probe if clock crystal is unstable (git-fixes).\n- serial: max310x: improve crystal stable clock detection (git-fixes).\n- serial: max310x: set default value when reading clock ready bit (git-fixes).\n- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).\n- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).\n- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).\n- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).\n- software node: Let args be NULL in software_node_get_reference_args (git-fixes).\n- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).\n- swiotlb-xen: provide the \u0027max_mapping_size\u0027 method (git-fixes).\n- swiotlb: fix a braino in the alignment check fix (bsc#1216559).\n- swiotlb: fix slot alignment checks (bsc#1216559).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- tracing: Add size check when printing trace_marker output (git-fixes).\n- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).\n- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).\n- tracing: Have large events show up as \u0027[LINE TOO BIG]\u0027 instead of nothing (git-fixes).\n- ubifs: Check @c-\u003edirty_[n|p]n_cnt and @c-\u003enroot state under @c-\u003elp_mutex (git-fixes).\n- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).\n- ubifs: ubifs_symlink: Fix memleak of inode-\u003ei_link in error path (git-fixes).\n- uio: Fix use-after-free in uio_open (git-fixes).\n- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).\n- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).\n- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).\n- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).\n- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).\n- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).\n- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).\n- usb: otg numberpad exception (bsc#1218527).\n- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).\n- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).\n- usb: ucsi: Add missing ppm_lock (git-fixes).\n- usb: ucsi_acpi: Fix command completion handling (git-fixes).\n- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).\n- usr/Kconfig: fix typos of \u0027its\u0027 (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).\n- virtio-mmio: fix memory leak of vm_dev (git-fixes).\n- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).\n- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).\n- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).\n- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).\n- watchdog: set cdev owner before adding (git-fixes).\n- wifi: ath11k: Defer on rproc_get failure (git-fixes).\n- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).\n- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).\n- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).\n- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).\n- wifi: libertas: stop selecting wext (git-fixes).\n- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).\n- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).\n- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).\n- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).\n- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).\n- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).\n- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).\n- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).\n- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).\n- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).\n- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).\n- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).\n- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).\n- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).\n- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).\n- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).\n- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).\n- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).\n- xen/events: fix delayed eoi list handling (git-fixes).\n- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).\n- xhci: cleanup xhci_hub_control port references (git-fixes).\n- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).\n- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-469,SUSE-SLE-Micro-5.5-2024-469,SUSE-SLE-Module-Live-Patching-15-SP5-2024-469,SUSE-SLE-Module-RT-15-SP5-2024-469,openSUSE-SLE-15.5-2024-469", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0469-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0469-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240469-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0469-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1174649", "url": "https://bugzilla.suse.com/1174649" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1194869", "url": "https://bugzilla.suse.com/1194869" }, { "category": "self", "summary": "SUSE Bug 1209834", "url": "https://bugzilla.suse.com/1209834" }, { "category": "self", "summary": "SUSE Bug 1210443", "url": "https://bugzilla.suse.com/1210443" }, { "category": "self", "summary": "SUSE Bug 1211515", "url": "https://bugzilla.suse.com/1211515" }, { "category": "self", "summary": "SUSE Bug 1212091", "url": "https://bugzilla.suse.com/1212091" }, { "category": "self", "summary": "SUSE Bug 1214377", "url": "https://bugzilla.suse.com/1214377" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1215885", "url": "https://bugzilla.suse.com/1215885" }, { "category": "self", "summary": "SUSE Bug 1216441", "url": "https://bugzilla.suse.com/1216441" }, { "category": "self", "summary": "SUSE Bug 1216559", "url": "https://bugzilla.suse.com/1216559" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217895", "url": "https://bugzilla.suse.com/1217895" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218005", "url": "https://bugzilla.suse.com/1218005" }, { "category": "self", "summary": "SUSE Bug 1218447", "url": "https://bugzilla.suse.com/1218447" }, { "category": "self", "summary": "SUSE Bug 1218527", "url": "https://bugzilla.suse.com/1218527" }, { "category": "self", "summary": "SUSE Bug 1218659", "url": "https://bugzilla.suse.com/1218659" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218723", "url": "https://bugzilla.suse.com/1218723" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218738", "url": "https://bugzilla.suse.com/1218738" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218778", "url": "https://bugzilla.suse.com/1218778" }, { "category": "self", "summary": "SUSE Bug 1218779", "url": "https://bugzilla.suse.com/1218779" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218916", "url": "https://bugzilla.suse.com/1218916" }, { "category": "self", "summary": "SUSE Bug 1218948", "url": "https://bugzilla.suse.com/1218948" }, { "category": "self", "summary": "SUSE Bug 1218958", "url": "https://bugzilla.suse.com/1218958" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1218997", "url": "https://bugzilla.suse.com/1218997" }, { "category": "self", "summary": "SUSE Bug 1219006", "url": "https://bugzilla.suse.com/1219006" }, { "category": "self", "summary": "SUSE Bug 1219012", "url": "https://bugzilla.suse.com/1219012" }, { "category": "self", "summary": "SUSE Bug 1219013", "url": "https://bugzilla.suse.com/1219013" }, { "category": "self", "summary": "SUSE Bug 1219014", "url": "https://bugzilla.suse.com/1219014" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219067", "url": "https://bugzilla.suse.com/1219067" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219136", "url": "https://bugzilla.suse.com/1219136" }, { "category": "self", "summary": "SUSE Bug 1219285", "url": "https://bugzilla.suse.com/1219285" }, { "category": "self", "summary": "SUSE Bug 1219349", "url": "https://bugzilla.suse.com/1219349" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219429", "url": "https://bugzilla.suse.com/1219429" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219490", "url": "https://bugzilla.suse.com/1219490" }, { "category": "self", "summary": "SUSE Bug 1219512", "url": "https://bugzilla.suse.com/1219512" }, { "category": "self", "summary": "SUSE Bug 1219568", "url": "https://bugzilla.suse.com/1219568" }, { "category": "self", "summary": "SUSE Bug 1219582", "url": "https://bugzilla.suse.com/1219582" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6531 page", "url": "https://www.suse.com/security/cve/CVE-2023-6531/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0641 page", "url": "https://www.suse.com/security/cve/CVE-2024-0641/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1085 page", "url": "https://www.suse.com/security/cve/CVE-2024-1085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-14T12:19:32Z", "generator": { "date": "2024-02-14T12:19:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0469-1", "initial_release_date": "2024-02-14T12:19:32Z", "revision_history": [ { "date": "2024-02-14T12:19:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "product": { "name": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "product_id": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.14.21-150500.13.35.1.noarch", "product": { "name": "kernel-source-rt-5.14.21-150500.13.35.1.noarch", "product_id": "kernel-source-rt-5.14.21-150500.13.35.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-extra-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-optional-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64", "product_id": "reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5" } } }, { "category": "product_name", "name": "SUSE Real Time Module 15 SP5", "product": { "name": "SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch" }, "product_reference": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.14.21-150500.13.35.1.noarch as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch" }, "product_reference": "kernel-source-rt-5.14.21-150500.13.35.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of SUSE Real Time Module 15 SP5", "product_id": "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch" }, "product_reference": "kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-optional-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.14.21-150500.13.35.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch" }, "product_reference": "kernel-source-rt-5.14.21-150500.13.35.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6531" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6531", "url": "https://www.suse.com/security/cve/CVE-2023-6531" }, { "category": "external", "summary": "SUSE Bug 1218447 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218447" }, { "category": "external", "summary": "SUSE Bug 1218487 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218487" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2023-6531" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0641" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel\u0027s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0641", "url": "https://www.suse.com/security/cve/CVE-2024-0641" }, { "category": "external", "summary": "SUSE Bug 1218916 for CVE-2024-0641", "url": "https://bugzilla.suse.com/1218916" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "moderate" } ], "title": "CVE-2024-0641" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1085" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1085", "url": "https://www.suse.com/security/cve/CVE-2024-1085" }, { "category": "external", "summary": "SUSE Bug 1219429 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219429" }, { "category": "external", "summary": "SUSE Bug 1219432 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.35.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.35.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:32Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:0468-1
Vulnerability from csaf_suse
Published
2024-02-14 12:19
Modified
2024-02-14 12:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
The following non-security bugs were fixed:
- 9p: missing chunk of 'fs/9p: Do not update file type when updating file attributes' (git-fixes).
- ACPICA: Avoid cache flush inside virtual machines (git-fixes).
- Fix build error in debug config
- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).
- acpi/nfit: improve bounds checking for 'func' (git-fixes).
- affs: fix basic permission bits to actually work (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- asix: Add check for usbnet_get_endpoints (git-fixes).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).
- chardev: fix error handling in cdev_device_add() (git-fixes).
- configfs: fix a deadlock in configfs_symlink() (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).
- configfs: fix memleak in configfs_release_bin_file (git-fixes).
- configfs: new object reprsenting tree fragments (git-fixes).
- configfs: provide exclusion between IO and removals (git-fixes).
- configfs: stash the data we need into configfs_buffer at open time (git-fixes).
- ext4: Avoid freeing inodes on dirty list (bsc#1216989).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).
- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).
- fs/file.c: initialize init_files.resize_wait (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).
- fs: ratelimit __find_get_block_slow() failure message (git-fixes).
- fs: warn about impending deprecation of mandatory locks (git-fixes).
- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Do not call dlm after protocol is unmounted (git-fixes).
- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).
- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix lru_count going negative (git-fixes).
- gfs2: Fix marking bitmaps non-full (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).
- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).
- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Special-case rindex for gfs2_grow (git-fixes).
- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).
- gfs2: add validation checks for size of superblock (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).
- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).
- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).
- gfs2: fix use-after-free on transaction ail lists (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).
- gfs2: report 'already frozen/thawed' errors (git-fixes).
- gfs2: take jdata unstuff into account in do_grow (git-fixes).
- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).
- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).
- help_next should increase position index (git-fixes).
- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).
- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).
- kernfs: bring names in comments in line with code (git-fixes).
- kernfs: fix use-after-free in __kernfs_remove (git-fixes).
- libceph: use kernel_connect() (bsc#1219446).
- libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes).
- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).
- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (git-fixes).
- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).
- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).
- libnvdimm/region: Fix label activation vs errors (git-fixes).
- libnvdimm: Fix compilation warnings with W=1 (git-fixes).
- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).
- libnvdimm: Validate command family indices (git-fixes).
- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).
- locks: print a warning when mount fails due to lack of 'mand' support (git-fixes).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).
- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).
- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).
- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).
- net: (cpts) fix a missing check of clk_prepare (git-fixes).
- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).
- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).
- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).
- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).
- net: ethernet: ti: fix possible object reference leak (git-fixes).
- net: fec: Do not use netdev messages too early (git-fixes).
- net: ks8851: Delay requesting IRQ until opened (git-fixes).
- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).
- net: ks8851: Set initial carrier state to down (git-fixes).
- net: macb: Add null check for PCLK and HCLK (git-fixed).
- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).
- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).
- net: phylink: avoid resolving link state too early (git-fixes).
- net: sfp: do not probe SFP module before we're attached (git-fixes).
- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).
- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).
- net: stmmac: do not overwrite discard_frame status (git-fixes).
- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).
- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).
- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).
- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).
- net: systemport: Fix reception of BPDUs (git-fixes).
- net: xilinx: fix possible object reference leak (git-fixed).
- nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968).
- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).
- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: fix orangefs df output (git-fixes).
- orangefs: rate limit the client not running info message (git-fixes).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).
- preserve KABI for struct plat_stmmacenet_data (git-fixes).
- preserve KABI for struct sfp_socket_ops (git-fixes).
- proc: fix /proc/*/map_files lookup (git-fixes).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).
- pstore/ram: Run without kernel crash dump region (git-fixes).
- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152).
- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).
- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- veth: Fixing transmit return status for dropped packets (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- writeback: Export inode_io_list_del() (bsc#1216989).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).
- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).
- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).
- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (git-fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).
- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- x86: Clear .brk area at early boot (git-fixes).
- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).
- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).
- x86: Mark stop_this_cpu() __noreturn (git-fixes).
- x86: Pin task-stack in __get_wchan() (git-fixes).
- x86: __always_inline __{rd,wr}msr() (git-fixes).
Patchnames
SUSE-2024-468,SUSE-SLE-RT-12-SP5-2024-468
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n\nThe following non-security bugs were fixed:\n\n- 9p: missing chunk of \u0027fs/9p: Do not update file type when updating file attributes\u0027 (git-fixes).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- Fix build error in debug config\n- GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022).\n- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes).\n- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).\n- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).\n- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- acpi/nfit: Require opt-in for read-only label configurations (git-fixes).\n- acpi/nfit: improve bounds checking for \u0027func\u0027 (git-fixes).\n- affs: fix basic permission bits to actually work (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445).\n- chardev: fix error handling in cdev_device_add() (git-fixes).\n- configfs: fix a deadlock in configfs_symlink() (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes).\n- configfs: fix memleak in configfs_release_bin_file (git-fixes).\n- configfs: new object reprsenting tree fragments (git-fixes).\n- configfs: provide exclusion between IO and removals (git-fixes).\n- configfs: stash the data we need into configfs_buffer at open time (git-fixes).\n- ext4: Avoid freeing inodes on dirty list (bsc#1216989).\n- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fs/exofs: fix potential memory leak in mount option parsing (git-fixes).\n- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git-fixes).\n- fs/fat/file.c: issue flush after the writeback of FAT (git-fixes).\n- fs/file.c: initialize init_files.resize_wait (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).\n- fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git-fixes).\n- fs: ratelimit __find_get_block_slow() failure message (git-fixes).\n- fs: warn about impending deprecation of mandatory locks (git-fixes).\n- gfs2: Allow lock_nolock mount to specify jid=X (git-fixes).\n- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).\n- gfs2: Do not call dlm after protocol is unmounted (git-fixes).\n- gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes).\n- gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes).\n- gfs2: Fix inode height consistency check (git-fixes).\n- gfs2: Fix lru_count going negative (git-fixes).\n- gfs2: Fix marking bitmaps non-full (git-fixes).\n- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).\n- gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes).\n- gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes).\n- gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git-fixes).\n- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).\n- gfs2: Special-case rindex for gfs2_grow (git-fixes).\n- gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes).\n- gfs2: add validation checks for size of superblock (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes).\n- gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes).\n- gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git-fixes).\n- gfs2: fix use-after-free on transaction ail lists (git-fixes).\n- gfs2: ignore negated quota changes (git-fixes).\n- gfs2: initialize transaction tr_ailX_lists earlier (git-fixes).\n- gfs2: report \u0027already frozen/thawed\u0027 errors (git-fixes).\n- gfs2: take jdata unstuff into account in do_grow (git-fixes).\n- gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes).\n- gtp: change NET_UDP_TUNNEL dependency to select (git-fixes).\n- help_next should increase position index (git-fixes).\n- iomap: sub-block dio needs to zeroout beyond EOF (git-fixes).\n- kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes).\n- kernfs: bring names in comments in line with code (git-fixes).\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- libceph: use kernel_connect() (bsc#1219446).\n- libnvdimm/btt: Fix LBA masking during \u0027free list\u0027 population (git-fixes).\n- libnvdimm/btt: Fix a kmemdup failure check (git-fixes).\n- libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (git-fixes).\n- libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/pmem: Delete include of nd-core.h (git-fixes).\n- libnvdimm/pmem: fix a possible OOB access when read and write pmem (git-fixes).\n- libnvdimm/region: Fix label activation vs errors (git-fixes).\n- libnvdimm: Fix compilation warnings with W=1 (git-fixes).\n- libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes).\n- libnvdimm: Validate command family indices (git-fixes).\n- libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes).\n- locks: print a warning when mount fails due to lack of \u0027mand\u0027 support (git-fixes).\n- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).\n- mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes).\n- mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes).\n- mlxsw: spectrum: Set LAG port collector only when active (git-fixes).\n- mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986).\n- net: (cpts) fix a missing check of clk_prepare (git-fixes).\n- net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes).\n- net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git-fixes).\n- net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed).\n- net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes).\n- net: ethernet: ti: fix possible object reference leak (git-fixes).\n- net: fec: Do not use netdev messages too early (git-fixes).\n- net: ks8851: Delay requesting IRQ until opened (git-fixes).\n- net: ks8851: Reassert reset pin if chip ID check fails (git-fixes).\n- net: ks8851: Set initial carrier state to down (git-fixes).\n- net: macb: Add null check for PCLK and HCLK (git-fixed).\n- net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes).\n- net: phy: sfp: warn the user when no tx_disable pin is available (git-fixes).\n- net: phylink: avoid resolving link state too early (git-fixes).\n- net: sfp: do not probe SFP module before we\u0027re attached (git-fixes).\n- net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes).\n- net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git-fixes).\n- net: stmmac: do not overwrite discard_frame status (git-fixes).\n- net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes).\n- net: stmmac: dwmac1000: Clear unused address entries (git-fixed).\n- net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git-fixes).\n- net: stmmac: dwmac4/5: Clear unused address entries (git-fixes).\n- net: systemport: Fix reception of BPDUs (git-fixes).\n- net: xilinx: fix possible object reference leak (git-fixed).\n- nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968).\n- nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525).\n- nvdimm/btt: do not call del_gendisk() if not needed (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes).\n- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).\n- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).\n- orangefs: fix orangefs df output (git-fixes).\n- orangefs: rate limit the client not running info message (git-fixes).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729).\n- preserve KABI for struct plat_stmmacenet_data (git-fixes).\n- preserve KABI for struct sfp_socket_ops (git-fixes).\n- proc: fix /proc/*/map_files lookup (git-fixes).\n- pstore/ram: Check start of empty przs during init (git-fixes).\n- pstore/ram: Fix error return code in ramoops_probe() (git-fixes).\n- pstore/ram: Run without kernel crash dump region (git-fixes).\n- pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- reiserfs: Check the return value from __getblk() (git-fixes).\n- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152). \n- scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes).\n- sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes).\n- statfs: enforce statfs[64] structure initialization (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).\n- veth: Fixing transmit return status for dropped packets (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- writeback: Export inode_io_list_del() (bsc#1216989). \n- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).\n- x86/alternatives: Sync core before enabling interrupts (git-fixes).\n- x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes).\n- x86/bugs: Add \u0027unknown\u0027 reporting for MMIO Stale Data (git-fixes).\n- x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes).\n- x86/build: Turn off -fcf-protection for realmode targets (git-fixes).\n- x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes).\n- x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes).\n- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).\n- x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes).\n- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).\n- x86/lib: Fix overflow when counting digits (git-fixes).\n- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes).\n- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).\n- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).\n- x86/mm: Add a x86_has_pat_wp() helper (git-fixes).\n- x86/pat: Fix x86_has_pat_wp() (git-fixes).\n- x86/pat: Pass valid address to sanitize_phys() (git-fixes).\n- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).\n- x86/pm: Fix false positive kmemleak report in msr_build_context() (git-fixes).\n- x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes).\n- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).\n- x86/topology: Fix duplicated core ID within a package (git-fixes).\n- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).\n- x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes).\n- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).\n- x86: Clear .brk area at early boot (git-fixes).\n- x86: Fix __get_wchan() for !STACKTRACE (git-fixes).\n- x86: Fix get_wchan() to support the ORC unwinder (git-fixes).\n- x86: Mark stop_this_cpu() __noreturn (git-fixes).\n- x86: Pin task-stack in __get_wchan() (git-fixes).\n- x86: __always_inline __{rd,wr}msr() (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-468,SUSE-SLE-RT-12-SP5-2024-468", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0468-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0468-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240468-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0468-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1123986", "url": "https://bugzilla.suse.com/1123986" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1206889", "url": "https://bugzilla.suse.com/1206889" }, { "category": "self", "summary": "SUSE Bug 1212152", "url": "https://bugzilla.suse.com/1212152" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1216989", "url": "https://bugzilla.suse.com/1216989" }, { "category": "self", "summary": "SUSE Bug 1217525", "url": "https://bugzilla.suse.com/1217525" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1219022", "url": "https://bugzilla.suse.com/1219022" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219445", "url": "https://bugzilla.suse.com/1219445" }, { "category": "self", "summary": "SUSE Bug 1219446", "url": "https://bugzilla.suse.com/1219446" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-14T12:19:13Z", "generator": { "date": "2024-02-14T12:19:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0468-1", "initial_release_date": "2024-02-14T12:19:13Z", "revision_history": [ { "date": "2024-02-14T12:19:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.162.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.162.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.162.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.162.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.162.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.162.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.162.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.162.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.162.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.162.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.162.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.162.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.162.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.162.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.162.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.162.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.162.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.162.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.162.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.162.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.162.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.162.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.162.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.162.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.162.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-14T12:19:13Z", "details": "important" } ], "title": "CVE-2024-1086" } ] }
suse-su-2024:1669-1
Vulnerability from csaf_suse
Published
2024-05-16 08:50
Modified
2024-05-16 08:50
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).
- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).
- CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219295).
- CVE-2021-46932: Initialized work before appletouch device registration (bsc#1220444).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2023-52475: Fixed a use-after-free in powermate_config_complete() (bsc#1220649).
- CVE-2023-52445: Fixed a use-after-free on context disconnection in pvrusb2 (bsc#1220241).
- CVE-2023-52429: Limited the number of targets and parameter size area for device mapper (bsc#1219146).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl() related to a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-51782: Fixed a use-after-free in rose_ioctl() related to a rose_accept race condition (bsc#1218757).
- CVE-2023-31083: Fixed a NULL pointer dereference in hci_uart_tty_ioctl() (bsc#1210780).
The following non-security bugs were fixed:
- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (bsc#1213456).
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
Patchnames
SUSE-2024-1669,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-1669
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).\n- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).\n- CVE-2023-52340: Fixed a denial of service related to ICMPv6 \u0027Packet Too Big\u0027 packets (bsc#1219295).\n- CVE-2021-46932: Initialized work before appletouch device registration (bsc#1220444).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2023-52475: Fixed a use-after-free in powermate_config_complete() (bsc#1220649).\n- CVE-2023-52445: Fixed a use-after-free on context disconnection in pvrusb2 (bsc#1220241).\n- CVE-2023-52429: Limited the number of targets and parameter size area for device mapper (bsc#1219146).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl() related to a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-51782: Fixed a use-after-free in rose_ioctl() related to a rose_accept race condition (bsc#1218757).\n- CVE-2023-31083: Fixed a NULL pointer dereference in hci_uart_tty_ioctl() (bsc#1210780).\n\nThe following non-security bugs were fixed:\n\n- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).\n- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).\n- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).\n- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: Add asm helpers for executing VERW (bsc#1213456).\n- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).\n- x86/entry_32: Add VERW just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-1669,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-1669", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1669-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:1669-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241669-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:1669-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" }, { "category": "self", "summary": "SUSE Bug 1210780", "url": "https://bugzilla.suse.com/1210780" }, { "category": "self", "summary": "SUSE Bug 1213456", "url": "https://bugzilla.suse.com/1213456" }, { "category": "self", "summary": "SUSE Bug 1218220", "url": "https://bugzilla.suse.com/1218220" }, { "category": "self", "summary": "SUSE Bug 1218562", "url": "https://bugzilla.suse.com/1218562" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1219146", "url": "https://bugzilla.suse.com/1219146" }, { "category": "self", "summary": "SUSE Bug 1219295", "url": "https://bugzilla.suse.com/1219295" }, { "category": "self", "summary": "SUSE Bug 1219827", "url": "https://bugzilla.suse.com/1219827" }, { "category": "self", "summary": "SUSE Bug 1220191", "url": "https://bugzilla.suse.com/1220191" }, { "category": "self", "summary": "SUSE Bug 1220238", "url": "https://bugzilla.suse.com/1220238" }, { "category": "self", "summary": "SUSE Bug 1220241", "url": "https://bugzilla.suse.com/1220241" }, { "category": "self", "summary": "SUSE Bug 1220416", "url": "https://bugzilla.suse.com/1220416" }, { "category": "self", "summary": "SUSE Bug 1220418", "url": "https://bugzilla.suse.com/1220418" }, { "category": "self", "summary": "SUSE Bug 1220444", "url": "https://bugzilla.suse.com/1220444" }, { "category": "self", "summary": "SUSE Bug 1220649", "url": "https://bugzilla.suse.com/1220649" }, { "category": "self", "summary": "SUSE Bug 1221044", "url": "https://bugzilla.suse.com/1221044" }, { "category": "self", "summary": "SUSE Bug 1221088", "url": "https://bugzilla.suse.com/1221088" }, { "category": "self", "summary": "SUSE Bug 1221578", "url": "https://bugzilla.suse.com/1221578" }, { "category": "self", "summary": "SUSE Bug 1221598", "url": "https://bugzilla.suse.com/1221598" }, { "category": "self", "summary": "SUSE Bug 1222585", "url": "https://bugzilla.suse.com/1222585" }, { "category": "self", "summary": "SUSE Bug 1222619", "url": "https://bugzilla.suse.com/1222619" }, { "category": "self", "summary": "SUSE Bug 1223016", "url": "https://bugzilla.suse.com/1223016" }, { "category": "self", "summary": "SUSE Bug 1223824", "url": "https://bugzilla.suse.com/1223824" }, { "category": "self", "summary": "SUSE CVE CVE-2021-46904 page", "url": "https://www.suse.com/security/cve/CVE-2021-46904/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-46905 page", "url": "https://www.suse.com/security/cve/CVE-2021-46905/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-46932 page", "url": "https://www.suse.com/security/cve/CVE-2021-46932/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-48619 page", "url": "https://www.suse.com/security/cve/CVE-2022-48619/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28746 page", "url": "https://www.suse.com/security/cve/CVE-2023-28746/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31083 page", "url": "https://www.suse.com/security/cve/CVE-2023-31083/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52340 page", "url": "https://www.suse.com/security/cve/CVE-2023-52340/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52429 page", "url": "https://www.suse.com/security/cve/CVE-2023-52429/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52445 page", "url": "https://www.suse.com/security/cve/CVE-2023-52445/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52449 page", "url": "https://www.suse.com/security/cve/CVE-2023-52449/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52475 page", "url": "https://www.suse.com/security/cve/CVE-2023-52475/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52590 page", "url": "https://www.suse.com/security/cve/CVE-2023-52590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-52591 page", "url": "https://www.suse.com/security/cve/CVE-2023-52591/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6270 page", "url": "https://www.suse.com/security/cve/CVE-2023-6270/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23851 page", "url": "https://www.suse.com/security/cve/CVE-2024-23851/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26733 page", "url": "https://www.suse.com/security/cve/CVE-2024-26733/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-26898 page", "url": "https://www.suse.com/security/cve/CVE-2024-26898/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-27043 page", "url": "https://www.suse.com/security/cve/CVE-2024-27043/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-05-16T08:50:07Z", "generator": { "date": "2024-05-16T08:50:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:1669-1", "initial_release_date": "2024-05-16T08:50:07Z", "revision_history": [ { "date": "2024-05-16T08:50:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-debug-3.0.101-108.153.1.i586", "product": { "name": "kernel-debug-3.0.101-108.153.1.i586", "product_id": "kernel-debug-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-debug-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-debug-base-3.0.101-108.153.1.i586", "product_id": "kernel-debug-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-debug-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-debug-devel-3.0.101-108.153.1.i586", "product_id": "kernel-debug-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-debug-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-debug-extra-3.0.101-108.153.1.i586", "product_id": "kernel-debug-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-debug-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-debug-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-debug-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.153.1.i586", "product": { "name": "kernel-default-3.0.101-108.153.1.i586", "product_id": "kernel-default-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.153.1.i586", "product_id": "kernel-default-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.153.1.i586", "product_id": "kernel-default-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-default-extra-3.0.101-108.153.1.i586", "product_id": "kernel-default-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-default-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-default-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-default-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.153.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.153.1.i586", "product_id": "kernel-ec2-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.153.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.153.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-ec2-extra-3.0.101-108.153.1.i586", "product_id": "kernel-ec2-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-ec2-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-ec2-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.153.1.i586", "product": { "name": "kernel-pae-3.0.101-108.153.1.i586", "product_id": "kernel-pae-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.153.1.i586", "product_id": "kernel-pae-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.153.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-pae-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-pae-extra-3.0.101-108.153.1.i586", "product_id": "kernel-pae-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-pae-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-pae-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-pae-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.i586", "product": { "name": "kernel-source-3.0.101-108.153.1.i586", "product_id": "kernel-source-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.i586", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.i586", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.153.1.i586", "product": { "name": "kernel-syms-3.0.101-108.153.1.i586", "product_id": "kernel-syms-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.153.1.i586", "product": { "name": "kernel-trace-3.0.101-108.153.1.i586", "product_id": "kernel-trace-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.153.1.i586", "product_id": "kernel-trace-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.153.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-trace-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-trace-extra-3.0.101-108.153.1.i586", "product_id": "kernel-trace-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-trace-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-trace-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-trace-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-vanilla-3.0.101-108.153.1.i586", "product": { "name": "kernel-vanilla-3.0.101-108.153.1.i586", "product_id": "kernel-vanilla-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-vanilla-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-vanilla-base-3.0.101-108.153.1.i586", "product_id": "kernel-vanilla-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-vanilla-devel-3.0.101-108.153.1.i586", "product_id": "kernel-vanilla-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-vanilla-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-vanilla-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-vanilla-hmac-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.153.1.i586", "product": { "name": "kernel-xen-3.0.101-108.153.1.i586", "product_id": "kernel-xen-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.153.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.153.1.i586", "product_id": "kernel-xen-base-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.153.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.153.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-108.153.1.i586", "product": { "name": "kernel-xen-extra-3.0.101-108.153.1.i586", "product_id": "kernel-xen-extra-3.0.101-108.153.1.i586" } }, { "category": "product_version", "name": "kernel-xen-hmac-3.0.101-108.153.1.i586", "product": { "name": "kernel-xen-hmac-3.0.101-108.153.1.i586", "product_id": "kernel-xen-hmac-3.0.101-108.153.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.ia64", "product": { "name": "kernel-source-3.0.101-108.153.1.ia64", "product_id": "kernel-source-3.0.101-108.153.1.ia64" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.ia64", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.ia64", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.153.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.153.1.noarch", "product_id": "kernel-docs-3.0.101-108.153.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.ppc", "product": { "name": "kernel-source-3.0.101-108.153.1.ppc", "product_id": "kernel-source-3.0.101-108.153.1.ppc" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.ppc", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.ppc", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.ppc" } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.153.1.ppc64", "product_id": "kernel-source-3.0.101-108.153.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.ppc64", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.ppc64", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.s390", "product": { "name": "kernel-source-3.0.101-108.153.1.s390", "product_id": "kernel-source-3.0.101-108.153.1.s390" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.s390", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.s390", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.s390x", "product": { "name": "kernel-source-3.0.101-108.153.1.s390x", "product_id": "kernel-source-3.0.101-108.153.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.s390x", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.s390x", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-debug-3.0.101-108.153.1.x86_64", "product_id": "kernel-debug-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-debug-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-debug-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-debug-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-debug-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-debug-extra-3.0.101-108.153.1.x86_64", "product_id": "kernel-debug-extra-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-debug-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-debug-hmac-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.153.1.x86_64", "product_id": "kernel-default-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-default-extra-3.0.101-108.153.1.x86_64", "product_id": "kernel-default-extra-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-default-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-default-hmac-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.153.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-ec2-extra-3.0.101-108.153.1.x86_64", "product_id": "kernel-ec2-extra-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-ec2-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-ec2-hmac-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.153.1.x86_64", "product_id": "kernel-source-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-source-vanilla-3.0.101-108.153.1.x86_64", "product_id": "kernel-source-vanilla-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.153.1.x86_64", "product_id": "kernel-syms-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.153.1.x86_64", "product_id": "kernel-trace-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-extra-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-trace-extra-3.0.101-108.153.1.x86_64", "product_id": "kernel-trace-extra-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-trace-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-trace-hmac-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-vanilla-3.0.101-108.153.1.x86_64", "product_id": "kernel-vanilla-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-vanilla-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-vanilla-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-vanilla-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-vanilla-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-vanilla-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-vanilla-hmac-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.153.1.x86_64", "product_id": "kernel-xen-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.153.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.153.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-xen-extra-3.0.101-108.153.1.x86_64", "product_id": "kernel-xen-extra-3.0.101-108.153.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-hmac-3.0.101-108.153.1.x86_64", "product": { "name": "kernel-xen-hmac-3.0.101-108.153.1.x86_64", "product_id": "kernel-xen-hmac-3.0.101-108.153.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product": { "name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.153.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.153.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-46904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-46904" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hso: fix null-ptr-deref during tty device unregistration\n\nMultiple ttys try to claim the same the minor number causing a double\nunregistration of the same device. The first unregistration succeeds\nbut the next one results in a null-ptr-deref.\n\nThe get_free_serial_index() function returns an available minor number\nbut doesn\u0027t assign it immediately. The assignment is done by the caller\nlater. But before this assignment, calls to get_free_serial_index()\nwould return the same minor number.\n\nFix this by modifying get_free_serial_index to assign the minor number\nimmediately after one is found to be and rename it to obtain_minor()\nto better reflect what it does. Similary, rename set_serial_by_index()\nto release_minor() and modify it to free up the minor number of the\ngiven hso_serial. Every obtain_minor() should have corresponding\nrelease_minor() call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-46904", "url": "https://www.suse.com/security/cve/CVE-2021-46904" }, { "category": "external", "summary": "SUSE Bug 1220416 for CVE-2021-46904", "url": "https://bugzilla.suse.com/1220416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2021-46904" }, { "cve": "CVE-2021-46905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-46905" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hso: fix NULL-deref on disconnect regression\n\nCommit 8a12f8836145 (\"net: hso: fix null-ptr-deref during tty device\nunregistration\") fixed the racy minor allocation reported by syzbot, but\nintroduced an unconditional NULL-pointer dereference on every disconnect\ninstead.\n\nSpecifically, the serial device table must no longer be accessed after\nthe minor has been released by hso_serial_tty_unregister().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-46905", "url": "https://www.suse.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "SUSE Bug 1220418 for CVE-2021-46905", "url": "https://bugzilla.suse.com/1220418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2021-46905" }, { "cve": "CVE-2021-46932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-46932" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork-\u003efunc == NULL, which means missing work initialization.\n\nThis may happen, since input_dev-\u003eclose() calls\ncancel_work_sync(\u0026dev-\u003ework), but dev-\u003ework initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev-\u003ework initialization before registering input\ndevice", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-46932", "url": "https://www.suse.com/security/cve/CVE-2021-46932" }, { "category": "external", "summary": "SUSE Bug 1220444 for CVE-2021-46932", "url": "https://bugzilla.suse.com/1220444" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2021-46932" }, { "cve": "CVE-2022-48619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-48619" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-48619", "url": "https://www.suse.com/security/cve/CVE-2022-48619" }, { "category": "external", "summary": "SUSE Bug 1218220 for CVE-2022-48619", "url": "https://bugzilla.suse.com/1218220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2022-48619" }, { "cve": "CVE-2023-28746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28746" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28746", "url": "https://www.suse.com/security/cve/CVE-2023-28746" }, { "category": "external", "summary": "SUSE Bug 1213456 for CVE-2023-28746", "url": "https://bugzilla.suse.com/1213456" }, { "category": "external", "summary": "SUSE Bug 1221323 for CVE-2023-28746", "url": "https://bugzilla.suse.com/1221323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-28746" }, { "cve": "CVE-2023-31083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31083" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu-\u003eproto is set. A NULL pointer dereference may occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31083", "url": "https://www.suse.com/security/cve/CVE-2023-31083" }, { "category": "external", "summary": "SUSE Bug 1210780 for CVE-2023-31083", "url": "https://bugzilla.suse.com/1210780" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-31083" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-52340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52340" } ], "notes": [ { "category": "general", "text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52340", "url": "https://www.suse.com/security/cve/CVE-2023-52340" }, { "category": "external", "summary": "SUSE Bug 1219295 for CVE-2023-52340", "url": "https://bugzilla.suse.com/1219295" }, { "category": "external", "summary": "SUSE Bug 1219296 for CVE-2023-52340", "url": "https://bugzilla.suse.com/1219296" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-52340", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-52340", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "important" } ], "title": "CVE-2023-52340" }, { "cve": "CVE-2023-52429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52429" } ], "notes": [ { "category": "general", "text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52429", "url": "https://www.suse.com/security/cve/CVE-2023-52429" }, { "category": "external", "summary": "SUSE Bug 1219827 for CVE-2023-52429", "url": "https://bugzilla.suse.com/1219827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-52429" }, { "cve": "CVE-2023-52445", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52445" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52445", "url": "https://www.suse.com/security/cve/CVE-2023-52445" }, { "category": "external", "summary": "SUSE Bug 1220241 for CVE-2023-52445", "url": "https://bugzilla.suse.com/1220241" }, { "category": "external", "summary": "SUSE Bug 1220315 for CVE-2023-52445", "url": "https://bugzilla.suse.com/1220315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-52445" }, { "cve": "CVE-2023-52449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52449" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u0027gluebi-\u003edesc\u0027 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52449", "url": "https://www.suse.com/security/cve/CVE-2023-52449" }, { "category": "external", "summary": "SUSE Bug 1220238 for CVE-2023-52449", "url": "https://bugzilla.suse.com/1220238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-52449" }, { "cve": "CVE-2023-52475", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52475" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52475", "url": "https://www.suse.com/security/cve/CVE-2023-52475" }, { "category": "external", "summary": "SUSE Bug 1220649 for CVE-2023-52475", "url": "https://bugzilla.suse.com/1220649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-52475" }, { "cve": "CVE-2023-52590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52590" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52590", "url": "https://www.suse.com/security/cve/CVE-2023-52590" }, { "category": "external", "summary": "SUSE Bug 1221088 for CVE-2023-52590", "url": "https://bugzilla.suse.com/1221088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-52590" }, { "cve": "CVE-2023-52591", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-52591" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-52591", "url": "https://www.suse.com/security/cve/CVE-2023-52591" }, { "category": "external", "summary": "SUSE Bug 1221044 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221044" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-52591", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "important" } ], "title": "CVE-2023-52591" }, { "cve": "CVE-2023-6270", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6270" } ], "notes": [ { "category": "general", "text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6270", "url": "https://www.suse.com/security/cve/CVE-2023-6270" }, { "category": "external", "summary": "SUSE Bug 1218562 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1218562" }, { "category": "external", "summary": "SUSE Bug 1218813 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1218813" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1223016 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1223016" }, { "category": "external", "summary": "SUSE Bug 1227675 for CVE-2023-6270", "url": "https://bugzilla.suse.com/1227675" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2023-6270" }, { "cve": "CVE-2024-23851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23851" } ], "notes": [ { "category": "general", "text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-\u003edata_size check. This is related to ctl_ioctl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23851", "url": "https://www.suse.com/security/cve/CVE-2024-23851" }, { "category": "external", "summary": "SUSE Bug 1219146 for CVE-2024-23851", "url": "https://bugzilla.suse.com/1219146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2024-23851" }, { "cve": "CVE-2024-26733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26733" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh-\u003eha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags. We initialise the field just after the memcpy(), so it\u0027s\nnot a problem.\n\nHowever, when dev-\u003eaddr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let\u0027s limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r-\u003earp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb \u003c0f\u003e 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS: 00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n \u003c/TASK\u003e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26733", "url": "https://www.suse.com/security/cve/CVE-2024-26733" }, { "category": "external", "summary": "SUSE Bug 1222585 for CVE-2024-26733", "url": "https://bugzilla.suse.com/1222585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "moderate" } ], "title": "CVE-2024-26733" }, { "cve": "CVE-2024-26898", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-26898" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n `struct net_device`, and a use-after-free can be triggered by racing\n between the free on the struct and the access through the `skbtxq`\n global queue. This could lead to a denial of service condition or\n potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()-\u003edev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-26898", "url": "https://www.suse.com/security/cve/CVE-2024-26898" }, { "category": "external", "summary": "SUSE Bug 1218562 for CVE-2024-26898", "url": "https://bugzilla.suse.com/1218562" }, { "category": "external", "summary": "SUSE Bug 1223016 for CVE-2024-26898", "url": "https://bugzilla.suse.com/1223016" }, { "category": "external", "summary": "SUSE Bug 1223017 for CVE-2024-26898", "url": "https://bugzilla.suse.com/1223017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "important" } ], "title": "CVE-2024-26898" }, { "cve": "CVE-2024-27043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-27043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev\u0027s deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n |-\u003e dvb_dmxdev_init\n |-\u003e dvb_register_device\n |-\u003e dvb_dmxdev_release\n |-\u003e dvb_unregister_device\n |-\u003e dvb_remove_device\n |-\u003e dvb_device_put\n |-\u003e kref_put\n\nWhen calling dvb_unregister_device, dmxdev-\u003edvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-27043", "url": "https://www.suse.com/security/cve/CVE-2024-27043" }, { "category": "external", "summary": "SUSE Bug 1218562 for CVE-2024-27043", "url": "https://bugzilla.suse.com/1218562" }, { "category": "external", "summary": "SUSE Bug 1223824 for CVE-2024-27043", "url": "https://bugzilla.suse.com/1223824" }, { "category": "external", "summary": "SUSE Bug 1223825 for CVE-2024-27043", "url": "https://bugzilla.suse.com/1223825" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.153.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.153.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-05-16T08:50:07Z", "details": "important" } ], "title": "CVE-2024-27043" } ] }
suse-su-2024:0516-1
Vulnerability from csaf_suse
Published
2024-02-15 15:04
Modified
2024-02-15 15:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
The following non-security bugs were fixed:
- Documentation: RAS: Add index and address translation section (jsc#PED-7618).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -> 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).
- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).
- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- Update patch reference for ax88179 fix (bsc#1218948)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req->src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen < sg->length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req->dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip->i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- pci: Drop PCI vmd patches that caused a regression (bsc#1218005)
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- series.conf: the patch is not in git and breaks series_insert.py
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (bsc#1219490).
- ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
Patchnames
SUSE-2024-516,SUSE-SLE-Micro-5.5-2024-516,SUSE-SLE-Module-Basesystem-15-SP5-2024-516,SUSE-SLE-Module-Development-Tools-15-SP5-2024-516,SUSE-SLE-Module-Legacy-15-SP5-2024-516,SUSE-SLE-Module-Live-Patching-15-SP5-2024-516,SUSE-SLE-Product-HA-15-SP5-2024-516,SUSE-SLE-Product-WE-15-SP5-2024-516,openSUSE-SLE-15.5-2024-516
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).\n- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).\n- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).\n- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).\n- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).\n- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).\n- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).\n- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).\n- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).\n- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).\n- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).\n- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).\n- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).\n\nThe following non-security bugs were fixed:\n\n- Documentation: RAS: Add index and address translation section (jsc#PED-7618).\n- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).\n- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).\n- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)\n- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).\n- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)\n- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).\n- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).\n- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)\n- ACPI: video: check for error while searching for backlight device parent (git-fixes).\n- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).\n- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).\n- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).\n- ALSA: hda: Refer to correct stream index at loops (git-fixes).\n- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).\n- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).\n- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).\n- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).\n- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).\n- ASoC: amd: Add check for acp config flags (bsc#1219136).\n- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).\n- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).\n- ASoC: amd: Drop empty platform remove function (bsc#1219136).\n- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).\n- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).\n- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).\n- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).\n- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).\n- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).\n- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).\n- ASoC: amd: acp: Add new cpu dai\u0027s in machine driver (bsc#1219136).\n- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).\n- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).\n- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).\n- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).\n- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).\n- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).\n- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).\n- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).\n- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).\n- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).\n- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).\n- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).\n- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).\n- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).\n- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).\n- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).\n- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).\n- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).\n- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).\n- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).\n- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).\n- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).\n- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).\n- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).\n- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).\n- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).\n- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).\n- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).\n- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).\n- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).\n- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).\n- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).\n- ASoC: amd: add acp6.2 irq handler (bsc#1219136).\n- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).\n- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).\n- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).\n- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).\n- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).\n- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).\n- ASoC: amd: fix ACP version typo mistake (bsc#1219136).\n- ASoC: amd: fix spelling mistake: \u0027i.e\u0027 -\u003e \u0027i.e.\u0027 (bsc#1219136).\n- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).\n- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).\n- ASoC: amd: ps: Update copyright notice (bsc#1219136).\n- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).\n- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).\n- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).\n- ASoC: amd: ps: move irq handler registration (bsc#1219136).\n- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).\n- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).\n- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).\n- ASoC: amd: ps: remove unused variable (bsc#1219136).\n- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).\n- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).\n- ASoC: amd: ps: update the acp clock source (bsc#1219136).\n- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).\n- ASoC: amd: ps: use static function (bsc#1219136).\n- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).\n- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).\n- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).\n- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).\n- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).\n- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).\n- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).\n- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).\n- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).\n- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).\n- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).\n- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).\n- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).\n- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).\n- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).\n- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).\n- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).\n- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).\n- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).\n- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).\n- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).\n- ASoC: cs43130: Fix the position of const qualifier (git-fixes).\n- ASoC: da7219: Support low DC impedance headset (git-fixes).\n- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).\n- ASoC: ops: add correct range check for limiting volume (git-fixes).\n- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).\n- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).\n- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).\n- ASoC: wm8974: Correct boost mixer inputs (git-fixes).\n- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).\n- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).\n- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).\n- Documentation: Begin a RAS section (jsc#PED-7622).\n- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).\n- EDAC/amd64: Add context struct (jsc#PED-7615).\n- EDAC/amd64: Add get_err_info() to pvt-\u003eops (jsc#PED-7615).\n- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).\n- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).\n- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).\n- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).\n- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).\n- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).\n- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).\n- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).\n- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).\n- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).\n- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).\n- EDAC/amd64: Remove module version string (jsc#PED-7615).\n- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).\n- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).\n- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).\n- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).\n- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).\n- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).\n- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).\n- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).\n- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).\n- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).\n- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).\n- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).\n- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).\n- IB/iser: Prevent invalidating wrong MR (git-fixes)\n- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).\n- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).\n- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).\n- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).\n- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).\n- Input: xpad - add Razer Wolverine V2 support (git-fixes).\n- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).\n- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).\n- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).\n- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).\n- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)\n- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).\n- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).\n- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).\n- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).\n- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).\n- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).\n- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).\n- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).\n- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)\n- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)\n- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)\n- RDMA/irdma: Add wait for suspend on SQD (git-fixes)\n- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)\n- RDMA/irdma: Do not modify to SQD on error (git-fixes)\n- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)\n- RDMA/irdma: Refactor error handling in create CQP (git-fixes)\n- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)\n- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)\n- RDMA/rtrs-clt: Start hb after path_up (git-fixes)\n- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)\n- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)\n- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)\n- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)\n- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)\n- USB: xhci: workaround for grace period (git-fixes).\n- Update config files: enable ASoC AMD PS drivers (bsc#1219136)\n- Update patch reference for ax88179 fix (bsc#1218948)\n- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).\n- aio: fix mremap after fork null-deref (git-fixes).\n- apparmor: avoid crash when parsed profile name is empty (git-fixes).\n- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)\n- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.\n- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)\n- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)\n- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)\n- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)\n- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)\n- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)\n- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)\n- arm64: module: move find_section to header (jsc#PED-4729)\n- arm64: vdso: Fix \u0027no previous prototype\u0027 warning (jsc#PED-4729)\n- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)\n- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)\n- asix: Add check for usbnet_get_endpoints (git-fixes).\n- attr: block mode changes of symlinks (git-fixes).\n- badblocks: add helper routines for badblock ranges handling (bsc#1174649).\n- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).\n- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).\n- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).\n- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).\n- badblocks: switch to the improved badblock handling code (bsc#1174649).\n- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).\n- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).\n- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).\n- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).\n- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).\n- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).\n- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).\n- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).\n- clk: samsung: Fix kernel-doc comments (git-fixes).\n- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).\n- clk: zynqmp: Add a check for NULL pointer (git-fixes).\n- clk: zynqmp: make bestdiv unsigned (git-fixes).\n- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).\n- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).\n- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)\n- coresight: etm4x: Allocate and device assign \u0027struct etmv4_drvdata\u0027 (bsc#1218779)\n- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)\n- coresight: etm4x: Drop iomem \u0027base\u0027 argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)\n- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)\n- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)\n- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).\n- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).\n- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).\n- crypto: sahara - do not resize req-\u003esrc when doing hash operations (git-fixes).\n- crypto: sahara - fix ahash reqsize (git-fixes).\n- crypto: sahara - fix ahash selftest failure (git-fixes).\n- crypto: sahara - fix cbc selftest failure (git-fixes).\n- crypto: sahara - fix processing hash requests with req-\u003enbytes \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix processing requests with cryptlen \u0026lt; sg-\u003elength (git-fixes).\n- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).\n- crypto: sahara - handle zero-length aes requests (git-fixes).\n- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).\n- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).\n- crypto: scomp - fix req-\u003edst buffer overflow (git-fixes).\n- dma-debug: fix kernel-doc warnings (git-fixes).\n- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).\n- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).\n- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).\n- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).\n- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).\n- doc/README.KSYMS: Add to repo.\n- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713).\n- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).\n- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).\n- drivers: clk: zynqmp: update divider round rate logic (git-fixes).\n- drm/amd/display: Fix tiled display misalignment (git-fixes).\n- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).\n- drm/amd/display: add nv12 bounding box (git-fixes).\n- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).\n- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).\n- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).\n- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).\n- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).\n- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).\n- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).\n- drm/amd/powerplay: Fix kzalloc parameter \u0027ATOM_Tonga_PPM_Table\u0027 in \u0027get_platform_power_management_table()\u0027 (git-fixes).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/amdgpu/pm: Fix the power source flag error (git-fixes).\n- drm/amdgpu: Add NULL checks for function pointers (git-fixes).\n- drm/amdgpu: Drop \u0027fence\u0027 check in \u0027to_amdgpu_amdkfd_fence()\u0027 (git-fixes).\n- drm/amdgpu: Fix \u0027*fw\u0027 from request_firmware() not released in \u0027amdgpu_ucode_request()\u0027 (git-fixes).\n- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).\n- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).\n- drm/amdgpu: Fix missing error code in \u0027gmc_v6/7/8/9_0_hw_init()\u0027 (git-fixes).\n- drm/amdgpu: Fix with right return code \u0027-EIO\u0027 in \u0027amdgpu_gmc_vram_checking()\u0027 (git-fixes).\n- drm/amdgpu: Let KFD sync with VM fences (git-fixes).\n- drm/amdgpu: Release \u0027adev-\u003epm.fw\u0027 before return in \u0027amdgpu_device_need_post()\u0027 (git-fixes).\n- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).\n- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).\n- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).\n- drm/amdkfd: Fix \u0027node\u0027 NULL check in \u0027svm_range_get_range_boundaries()\u0027 (git-fixes).\n- drm/amdkfd: Fix iterator used outside loop in \u0027kfd_add_peer_prop()\u0027 (git-fixes).\n- drm/amdkfd: Fix lock dependency warning (git-fixes).\n- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).\n- drm/amdkfd: Use resource_size() helper function (git-fixes).\n- drm/amdkfd: fixes for HMM mem allocation (git-fixes).\n- drm/bridge: Fix typo in post_disable() description (git-fixes).\n- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).\n- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).\n- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).\n- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).\n- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).\n- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).\n- drm/bridge: tc358767: Fix return value on error case (git-fixes).\n- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).\n- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).\n- drm/crtc: fix uninitialized variable use (git-fixes).\n- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).\n- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).\n- drm/exynos: fix a potential error pointer dereference (git-fixes).\n- drm/exynos: fix a wrong error checking (git-fixes).\n- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).\n- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).\n- drm/framebuffer: Fix use of uninitialized variable (git-fixes).\n- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).\n- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).\n- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).\n- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).\n- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).\n- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).\n- drm/msm/dsi: Enable runtime PM (git-fixes).\n- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).\n- drm/msm/mdp4: flush vblank event on disable (git-fixes).\n- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).\n- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).\n- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).\n- drm/panel: nt35510: fix typo (git-fixes).\n- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).\n- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).\n- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).\n- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).\n- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).\n- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).\n- drm/radeon: check return value of radeon_ring_lock() (git-fixes).\n- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).\n- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).\n- drm/tidss: Fix atomic_flush check (git-fixes).\n- drm/tidss: Fix dss reset (git-fixes).\n- drm/tidss: Move reset to the end of dispc_init() (git-fixes).\n- drm/tidss: Return error value from from softreset (git-fixes).\n- drm/tilcdc: Fix irq free on unload (git-fixes).\n- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).\n- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).\n- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).\n- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)\n- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).\n- eventfd: prevent underflow for eventfd semaphores (git-fixes).\n- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).\n- exfat: support handle zero-size directory (git-fixes).\n- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).\n- fbdev: Only disable sysfb on the primary device (bsc#1216441)\n- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.\n- fbdev: flush deferred IO before closing (git-fixes).\n- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).\n- fbdev: imxfb: fix left margin setting (git-fixes).\n- fbdev: mmp: Fix typo and wording in code comment (git-fixes).\n- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).\n- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).\n- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).\n- fjes: fix memleaks in fjes_hw_setup (git-fixes).\n- fs/mount_setattr: always cleanup mount_kattr (git-fixes).\n- fs: Fix error checking for d_hash_and_lookup() (git-fixes).\n- fs: Move notify_change permission checks into may_setattr (git-fixes).\n- fs: do not audit the capability check in simple_xattr_list() (git-fixes).\n- fs: drop peer group ids under namespace lock (git-fixes).\n- fs: indicate request originates from old mount API (git-fixes).\n- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).\n- fuse: dax: set fc-\u003edax to NULL in fuse_dax_conn_free() (bsc#1218659).\n- gfs2: Always check inode size of inline inodes (git-fixes).\n- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).\n- gfs2: Disable page faults during lockless buffered reads (git-fixes).\n- gfs2: Eliminate ip-\u003ei_gh (git-fixes).\n- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).\n- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).\n- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).\n- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).\n- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).\n- gfs2: Switch to wait_event in gfs2_logd (git-fixes).\n- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).\n- gfs2: low-memory forced flush fixes (git-fixes).\n- gfs2: release iopen glock early in evict (git-fixes).\n- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).\n- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).\n- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).\n- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).\n- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).\n- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).\n- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).\n- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).\n- iio: adc: ad9467: do not ignore error codes (git-fixes).\n- iio: adc: ad9467: fix reset gpio handling (git-fixes).\n- ipmi: Use regspacings passed as a module parameter (git-fixes).\n- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)\n- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).\n- kernel-doc: handle a void function without producing a warning (git-fixes).\n- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).\n- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).\n- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).\n- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).\n- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).\n- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).\n- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).\n- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).\n- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).\n- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).\n- media: pvrusb2: fix use after free on context disconnection (git-fixes).\n- media: rkisp1: Disable runtime PM in probe error path (git-fixes).\n- media: rkisp1: Fix media device memory leak (git-fixes).\n- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).\n- media: videobuf2-dma-sg: fix vmap callback (git-fixes).\n- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).\n- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).\n- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).\n- mmc: core: Cancel delayed work before releasing host (git-fixes).\n- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).\n- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).\n- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).\n- mtd: rawnand: pl353: Fix kernel doc (git-fixes).\n- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).\n- mtd: rawnand: rockchip: Rename a structure (git-fixes).\n- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).\n- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).\n- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).\n- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).\n- net: usb: ax88179_178a: remove redundant init code (git-fixes).\n- net: usb: ax88179_178a: restore state on resume (bsc#1218948).\n- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).\n- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).\n- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).\n- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).\n- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).\n- nsfs: add compat ioctl handler (git-fixes).\n- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).\n- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).\n- nvme-pci: fix sleeping function called from interrupt context (git-fixes).\n- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).\n- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).\n- nvme: fix max_discard_sectors calculation (git-fixes).\n- nvme: introduce helper function to get ctrl state (git-fixes).\n- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).\n- nvme: start keep-alive after admin queue setup (bsc#1211515).\n- nvme: trace: avoid memcpy overflow warning (git-fixes).\n- nvmet: re-fix tracing strncpy() warning (git-fixes).\n- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).\n- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).\n- parport: parport_serial: Add Brainboxes BAR details (git-fixes).\n- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).\n- pci: Drop PCI vmd patches that caused a regression (bsc#1218005)\n- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).\n- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).\n- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).\n- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).\n- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).\n- pinctrl: intel: Revert \u0027Unexport intel_pinctrl_probe()\u0027 (git-fixes).\n- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).\n- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).\n- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).\n- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).\n- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).\n- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).\n- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).\n- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).\n- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).\n- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).\n- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).\n- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).\n- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).\n- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).\n- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).\n- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).\n- powerpc/xive: Fix endian conversion size (bsc#1194869).\n- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).\n- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).\n- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).\n- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).\n- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).\n- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).\n- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).\n- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).\n- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).\n- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).\n- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).\n- s390/dasd: fix double module refcount decrement (bsc#1141539).\n- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).\n- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).\n- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest\u0027s APCB (git-fixes bsc#1219014).\n- s390/vfio-ap: loop over the shadow APCB when filtering guest\u0027s AP configuration (git-fixes bsc#1219013).\n- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).\n- sched/isolation: add cpu_is_isolated() API (bsc#1217895).\n- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Always send batch on reset or error handling command (git-fixes).\n- scsi: fnic: Return error if vmalloc() failed (git-fixes).\n- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).\n- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).\n- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).\n- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).\n- scsi: hisi_sas: Rename HISI_SAS_{RESET -\u003e RESETTING}_BIT (git-fixes).\n- scsi: hisi_sas: Replace with standard error code return value (git-fixes).\n- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).\n- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).\n- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).\n- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).\n- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).\n- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).\n- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).\n- scsi: lpfc: Reinitialize an NPIV\u0027s VMID data structures after FDISC (bsc#1219582).\n- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).\n- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix an outdated comment (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (bsc#1219067).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).\n- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).\n- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).\n- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).\n- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).\n- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).\n- serial: imx: Correct clock error message in function probe() (git-fixes).\n- serial: imx: fix tx statemachine deadlock (git-fixes).\n- serial: max310x: fail probe if clock crystal is unstable (git-fixes).\n- serial: max310x: improve crystal stable clock detection (git-fixes).\n- serial: max310x: set default value when reading clock ready bit (git-fixes).\n- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).\n- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).\n- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).\n- series.conf: the patch is not in git and breaks series_insert.py\n- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).\n- software node: Let args be NULL in software_node_get_reference_args (git-fixes).\n- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).\n- swiotlb-xen: provide the \u0027max_mapping_size\u0027 method (git-fixes).\n- swiotlb: fix a braino in the alignment check fix (bsc#1216559).\n- swiotlb: fix slot alignment checks (bsc#1216559).\n- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).\n- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).\n- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).\n- tracing: Add size check when printing trace_marker output (git-fixes).\n- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).\n- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).\n- tracing: Have large events show up as \u0027[LINE TOO BIG]\u0027 instead of nothing (git-fixes).\n- tracing: Increase trace array ref count on enable and filter files (bsc#1219490).\n- ubifs: Check @c-\u003edirty_[n|p]n_cnt and @c-\u003enroot state under @c-\u003elp_mutex (git-fixes).\n- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).\n- ubifs: ubifs_symlink: Fix memleak of inode-\u003ei_link in error path (git-fixes).\n- uio: Fix use-after-free in uio_open (git-fixes).\n- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).\n- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).\n- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).\n- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).\n- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).\n- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).\n- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).\n- usb: otg numberpad exception (bsc#1218527).\n- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).\n- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).\n- usb: ucsi: Add missing ppm_lock (git-fixes).\n- usb: ucsi_acpi: Fix command completion handling (git-fixes).\n- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).\n- usr/Kconfig: fix typos of \u0027its\u0027 (git-fixes).\n- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).\n- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).\n- virtio-mmio: fix memory leak of vm_dev (git-fixes).\n- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).\n- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).\n- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).\n- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).\n- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).\n- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).\n- watchdog: set cdev owner before adding (git-fixes).\n- wifi: ath11k: Defer on rproc_get failure (git-fixes).\n- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).\n- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).\n- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).\n- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).\n- wifi: libertas: stop selecting wext (git-fixes).\n- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).\n- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).\n- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).\n- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).\n- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).\n- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).\n- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).\n- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).\n- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).\n- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).\n- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).\n- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).\n- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).\n- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).\n- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).\n- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).\n- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).\n- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).\n- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).\n- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).\n- xen/events: fix delayed eoi list handling (git-fixes).\n- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).\n- xhci: cleanup xhci_hub_control port references (git-fixes).\n- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).\n- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-516,SUSE-SLE-Micro-5.5-2024-516,SUSE-SLE-Module-Basesystem-15-SP5-2024-516,SUSE-SLE-Module-Development-Tools-15-SP5-2024-516,SUSE-SLE-Module-Legacy-15-SP5-2024-516,SUSE-SLE-Module-Live-Patching-15-SP5-2024-516,SUSE-SLE-Product-HA-15-SP5-2024-516,SUSE-SLE-Product-WE-15-SP5-2024-516,openSUSE-SLE-15.5-2024-516", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0516-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0516-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240516-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0516-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1108281", "url": "https://bugzilla.suse.com/1108281" }, { "category": "self", "summary": "SUSE Bug 1141539", "url": "https://bugzilla.suse.com/1141539" }, { "category": "self", "summary": "SUSE Bug 1174649", "url": "https://bugzilla.suse.com/1174649" }, { "category": "self", "summary": "SUSE Bug 1181674", "url": "https://bugzilla.suse.com/1181674" }, { "category": "self", "summary": "SUSE Bug 1193285", "url": "https://bugzilla.suse.com/1193285" }, { "category": "self", "summary": "SUSE Bug 1194869", "url": "https://bugzilla.suse.com/1194869" }, { "category": "self", "summary": "SUSE Bug 1209834", "url": "https://bugzilla.suse.com/1209834" }, { "category": "self", "summary": "SUSE Bug 1210443", "url": "https://bugzilla.suse.com/1210443" }, { "category": "self", "summary": "SUSE Bug 1211515", "url": "https://bugzilla.suse.com/1211515" }, { "category": "self", "summary": "SUSE Bug 1212091", "url": "https://bugzilla.suse.com/1212091" }, { "category": "self", "summary": "SUSE Bug 1214377", "url": "https://bugzilla.suse.com/1214377" }, { "category": "self", "summary": "SUSE Bug 1215275", "url": "https://bugzilla.suse.com/1215275" }, { "category": "self", "summary": "SUSE Bug 1215885", "url": "https://bugzilla.suse.com/1215885" }, { "category": "self", "summary": "SUSE Bug 1216441", "url": "https://bugzilla.suse.com/1216441" }, { "category": "self", "summary": "SUSE Bug 1216559", "url": "https://bugzilla.suse.com/1216559" }, { "category": "self", "summary": "SUSE Bug 1216702", "url": "https://bugzilla.suse.com/1216702" }, { "category": "self", "summary": "SUSE Bug 1217895", "url": "https://bugzilla.suse.com/1217895" }, { "category": "self", "summary": "SUSE Bug 1217987", "url": "https://bugzilla.suse.com/1217987" }, { "category": "self", "summary": "SUSE Bug 1217988", "url": "https://bugzilla.suse.com/1217988" }, { "category": "self", "summary": "SUSE Bug 1217989", "url": "https://bugzilla.suse.com/1217989" }, { "category": "self", "summary": "SUSE Bug 1218005", "url": "https://bugzilla.suse.com/1218005" }, { "category": "self", "summary": "SUSE Bug 1218447", "url": "https://bugzilla.suse.com/1218447" }, { "category": "self", "summary": "SUSE Bug 1218527", "url": "https://bugzilla.suse.com/1218527" }, { "category": "self", "summary": "SUSE Bug 1218659", "url": "https://bugzilla.suse.com/1218659" }, { "category": "self", "summary": "SUSE Bug 1218689", "url": "https://bugzilla.suse.com/1218689" }, { "category": "self", "summary": "SUSE Bug 1218713", "url": "https://bugzilla.suse.com/1218713" }, { "category": "self", "summary": "SUSE Bug 1218723", "url": "https://bugzilla.suse.com/1218723" }, { "category": "self", "summary": "SUSE Bug 1218730", "url": "https://bugzilla.suse.com/1218730" }, { "category": "self", "summary": "SUSE Bug 1218752", "url": "https://bugzilla.suse.com/1218752" }, { "category": "self", "summary": "SUSE Bug 1218757", "url": "https://bugzilla.suse.com/1218757" }, { "category": "self", "summary": "SUSE Bug 1218768", "url": "https://bugzilla.suse.com/1218768" }, { "category": "self", "summary": "SUSE Bug 1218778", "url": "https://bugzilla.suse.com/1218778" }, { "category": "self", "summary": "SUSE Bug 1218779", "url": "https://bugzilla.suse.com/1218779" }, { "category": "self", "summary": "SUSE Bug 1218804", "url": "https://bugzilla.suse.com/1218804" }, { "category": "self", "summary": "SUSE Bug 1218832", "url": "https://bugzilla.suse.com/1218832" }, { "category": "self", "summary": "SUSE Bug 1218836", "url": "https://bugzilla.suse.com/1218836" }, { "category": "self", "summary": "SUSE Bug 1218916", "url": "https://bugzilla.suse.com/1218916" }, { "category": "self", "summary": "SUSE Bug 1218948", "url": "https://bugzilla.suse.com/1218948" }, { "category": "self", "summary": "SUSE Bug 1218958", "url": "https://bugzilla.suse.com/1218958" }, { "category": "self", "summary": "SUSE Bug 1218968", "url": "https://bugzilla.suse.com/1218968" }, { "category": "self", "summary": "SUSE Bug 1218997", "url": "https://bugzilla.suse.com/1218997" }, { "category": "self", "summary": "SUSE Bug 1219006", "url": "https://bugzilla.suse.com/1219006" }, { "category": "self", "summary": "SUSE Bug 1219012", "url": "https://bugzilla.suse.com/1219012" }, { "category": "self", "summary": "SUSE Bug 1219013", "url": "https://bugzilla.suse.com/1219013" }, { "category": "self", "summary": "SUSE Bug 1219014", "url": "https://bugzilla.suse.com/1219014" }, { "category": "self", "summary": "SUSE Bug 1219053", "url": "https://bugzilla.suse.com/1219053" }, { "category": "self", "summary": "SUSE Bug 1219067", "url": "https://bugzilla.suse.com/1219067" }, { "category": "self", "summary": "SUSE Bug 1219120", "url": "https://bugzilla.suse.com/1219120" }, { "category": "self", "summary": "SUSE Bug 1219128", "url": "https://bugzilla.suse.com/1219128" }, { "category": "self", "summary": "SUSE Bug 1219136", "url": "https://bugzilla.suse.com/1219136" }, { "category": "self", "summary": "SUSE Bug 1219285", "url": "https://bugzilla.suse.com/1219285" }, { "category": "self", "summary": "SUSE Bug 1219349", "url": "https://bugzilla.suse.com/1219349" }, { "category": "self", "summary": "SUSE Bug 1219412", "url": "https://bugzilla.suse.com/1219412" }, { "category": "self", "summary": "SUSE Bug 1219429", "url": "https://bugzilla.suse.com/1219429" }, { "category": "self", "summary": "SUSE Bug 1219434", "url": "https://bugzilla.suse.com/1219434" }, { "category": "self", "summary": "SUSE Bug 1219490", "url": "https://bugzilla.suse.com/1219490" }, { "category": "self", "summary": "SUSE Bug 1219512", "url": "https://bugzilla.suse.com/1219512" }, { "category": "self", "summary": "SUSE Bug 1219568", "url": "https://bugzilla.suse.com/1219568" }, { "category": "self", "summary": "SUSE Bug 1219582", "url": "https://bugzilla.suse.com/1219582" }, { "category": "self", "summary": "SUSE Bug 1219608", "url": "https://bugzilla.suse.com/1219608" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33631 page", "url": "https://www.suse.com/security/cve/CVE-2021-33631/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46838 page", "url": "https://www.suse.com/security/cve/CVE-2023-46838/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-47233 page", "url": "https://www.suse.com/security/cve/CVE-2023-47233/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4921 page", "url": "https://www.suse.com/security/cve/CVE-2023-4921/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51042 page", "url": "https://www.suse.com/security/cve/CVE-2023-51042/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51043 page", "url": "https://www.suse.com/security/cve/CVE-2023-51043/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51780 page", "url": "https://www.suse.com/security/cve/CVE-2023-51780/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-51782 page", "url": "https://www.suse.com/security/cve/CVE-2023-51782/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6040 page", "url": "https://www.suse.com/security/cve/CVE-2023-6040/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6356 page", "url": "https://www.suse.com/security/cve/CVE-2023-6356/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6531 page", "url": "https://www.suse.com/security/cve/CVE-2023-6531/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6535 page", "url": "https://www.suse.com/security/cve/CVE-2023-6535/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6536 page", "url": "https://www.suse.com/security/cve/CVE-2023-6536/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6915 page", "url": "https://www.suse.com/security/cve/CVE-2023-6915/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0340 page", "url": "https://www.suse.com/security/cve/CVE-2024-0340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0565 page", "url": "https://www.suse.com/security/cve/CVE-2024-0565/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0641 page", "url": "https://www.suse.com/security/cve/CVE-2024-0641/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-0775 page", "url": "https://www.suse.com/security/cve/CVE-2024-0775/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1085 page", "url": "https://www.suse.com/security/cve/CVE-2024-1085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-1086 page", "url": "https://www.suse.com/security/cve/CVE-2024-1086/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-24860 page", "url": "https://www.suse.com/security/cve/CVE-2024-24860/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2024-02-15T15:04:35Z", "generator": { "date": "2024-02-15T15:04:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0516-1", "initial_release_date": "2024-02-15T15:04:35Z", "revision_history": [ { "date": "2024-02-15T15:04:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-allwinner-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-altera-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-altera-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-amazon-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-amazon-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-amazon-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-amd-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-amd-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-amlogic-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-apm-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-apm-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-apple-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-apple-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-apple-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-arm-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-arm-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-broadcom-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-cavium-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-cavium-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-exynos-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-exynos-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-freescale-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-freescale-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-hisilicon-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-lg-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-lg-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-marvell-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-marvell-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-mediatek-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-nvidia-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-qcom-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-qcom-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-renesas-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-renesas-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-rockchip-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-socionext-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-socionext-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-sprd-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-sprd-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "product": { "name": "dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "product_id": "dtb-xilinx-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "product": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "product_id": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-extra-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-default-optional-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-obs-qa-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kernel-syms-5.14.21-150500.55.49.1.aarch64", "product_id": "kernel-syms-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "product_id": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-devel-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-devel-5.14.21-150500.55.49.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-docs-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-docs-5.14.21-150500.55.49.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-docs-html-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-docs-html-5.14.21-150500.55.49.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-macros-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-macros-5.14.21-150500.55.49.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-source-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-source-5.14.21-150500.55.49.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "product": { "name": "kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "product_id": "kernel-source-vanilla-5.14.21-150500.55.49.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-debug-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-debug-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "product": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "product_id": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-extra-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-default-optional-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kernel-syms-5.14.21-150500.55.49.1.ppc64le", "product_id": "kernel-syms-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "product_id": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-devel-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-extra-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-default-optional-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-obs-build-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-obs-qa-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-syms-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-syms-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "product": { "name": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "product_id": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "kselftests-kmp-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "product": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "product_id": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-debug-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-debug-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-debug-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "product": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "product_id": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "product_id": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-optional-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-default-vdso-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-obs-qa-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kernel-syms-5.14.21-150500.55.49.1.x86_64", "product_id": "kernel-syms-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "product_id": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP5", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150500.55.49.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150500.55.49.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150500.55.49.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150500.55.49.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-source-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-allwinner-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-altera-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-altera-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amazon-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-amazon-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amd-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-amd-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amlogic-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apm-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-apm-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apple-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-apple-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-arm-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-arm-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-broadcom-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-cavium-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-cavium-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-exynos-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-exynos-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-freescale-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-freescale-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-hisilicon-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-lg-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-lg-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-marvell-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-marvell-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-mediatek-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-nvidia-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-qcom-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-qcom-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-renesas-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-renesas-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-rockchip-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-socionext-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-socionext-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-sprd-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-sprd-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-xilinx-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-debug-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-debug-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-extra-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-default-optional-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-vdso-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-docs-html-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-source-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.21-150500.55.49.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch" }, "product_reference": "kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33631" } ], "notes": [ { "category": "general", "text": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33631", "url": "https://www.suse.com/security/cve/CVE-2021-33631" }, { "category": "external", "summary": "SUSE Bug 1219412 for CVE-2021-33631", "url": "https://bugzilla.suse.com/1219412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2021-33631" }, { "cve": "CVE-2023-46838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46838" } ], "notes": [ { "category": "general", "text": "Transmit requests in Xen\u0027s virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46838", "url": "https://www.suse.com/security/cve/CVE-2023-46838" }, { "category": "external", "summary": "SUSE Bug 1218836 for CVE-2023-46838", "url": "https://bugzilla.suse.com/1218836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-46838" }, { "cve": "CVE-2023-47233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-47233" } ], "notes": [ { "category": "general", "text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-47233", "url": "https://www.suse.com/security/cve/CVE-2023-47233" }, { "category": "external", "summary": "SUSE Bug 1216702 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1216702" }, { "category": "external", "summary": "SUSE Bug 1224592 for CVE-2023-47233", "url": "https://bugzilla.suse.com/1224592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-47233" }, { "cve": "CVE-2023-4921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4921" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4921", "url": "https://www.suse.com/security/cve/CVE-2023-4921" }, { "category": "external", "summary": "SUSE Bug 1215275 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215275" }, { "category": "external", "summary": "SUSE Bug 1215300 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1215300" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1220906 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1220906" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224418 for CVE-2023-4921", "url": "https://bugzilla.suse.com/1224418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-51042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51042" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51042", "url": "https://www.suse.com/security/cve/CVE-2023-51042" }, { "category": "external", "summary": "SUSE Bug 1219128 for CVE-2023-51042", "url": "https://bugzilla.suse.com/1219128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-51042" }, { "cve": "CVE-2023-51043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51043" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51043", "url": "https://www.suse.com/security/cve/CVE-2023-51043" }, { "category": "external", "summary": "SUSE Bug 1219120 for CVE-2023-51043", "url": "https://bugzilla.suse.com/1219120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51780", "url": "https://www.suse.com/security/cve/CVE-2023-51780" }, { "category": "external", "summary": "SUSE Bug 1218730 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218730" }, { "category": "external", "summary": "SUSE Bug 1218733 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1218733" }, { "category": "external", "summary": "SUSE Bug 1220191 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1220191" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1221598" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2023-51780", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-51782" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-51782", "url": "https://www.suse.com/security/cve/CVE-2023-51782" }, { "category": "external", "summary": "SUSE Bug 1218757 for CVE-2023-51782", "url": "https://bugzilla.suse.com/1218757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-6040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6040" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6040", "url": "https://www.suse.com/security/cve/CVE-2023-6040" }, { "category": "external", "summary": "SUSE Bug 1218752 for CVE-2023-6040", "url": "https://bugzilla.suse.com/1218752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6356" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6356", "url": "https://www.suse.com/security/cve/CVE-2023-6356" }, { "category": "external", "summary": "SUSE Bug 1217987 for CVE-2023-6356", "url": "https://bugzilla.suse.com/1217987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-6356" }, { "cve": "CVE-2023-6531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6531" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector\u0027s deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6531", "url": "https://www.suse.com/security/cve/CVE-2023-6531" }, { "category": "external", "summary": "SUSE Bug 1218447 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218447" }, { "category": "external", "summary": "SUSE Bug 1218487 for CVE-2023-6531", "url": "https://bugzilla.suse.com/1218487" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2023-6531" }, { "cve": "CVE-2023-6535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6535" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6535", "url": "https://www.suse.com/security/cve/CVE-2023-6535" }, { "category": "external", "summary": "SUSE Bug 1217988 for CVE-2023-6535", "url": "https://bugzilla.suse.com/1217988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-6535" }, { "cve": "CVE-2023-6536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6536" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6536", "url": "https://www.suse.com/security/cve/CVE-2023-6536" }, { "category": "external", "summary": "SUSE Bug 1217989 for CVE-2023-6536", "url": "https://bugzilla.suse.com/1217989" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-6536" }, { "cve": "CVE-2023-6915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6915" } ], "notes": [ { "category": "general", "text": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6915", "url": "https://www.suse.com/security/cve/CVE-2023-6915" }, { "category": "external", "summary": "SUSE Bug 1218804 for CVE-2023-6915", "url": "https://bugzilla.suse.com/1218804" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2023-6915" }, { "cve": "CVE-2024-0340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0340" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0340", "url": "https://www.suse.com/security/cve/CVE-2024-0340" }, { "category": "external", "summary": "SUSE Bug 1218689 for CVE-2024-0340", "url": "https://bugzilla.suse.com/1218689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "low" } ], "title": "CVE-2024-0340" }, { "cve": "CVE-2024-0565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0565" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0565", "url": "https://www.suse.com/security/cve/CVE-2024-0565" }, { "category": "external", "summary": "SUSE Bug 1218832 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1218832" }, { "category": "external", "summary": "SUSE Bug 1219078 for CVE-2024-0565", "url": "https://bugzilla.suse.com/1219078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0641" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel\u0027s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0641", "url": "https://www.suse.com/security/cve/CVE-2024-0641" }, { "category": "external", "summary": "SUSE Bug 1218916 for CVE-2024-0641", "url": "https://bugzilla.suse.com/1218916" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2024-0641" }, { "cve": "CVE-2024-0775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-0775" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-0775", "url": "https://www.suse.com/security/cve/CVE-2024-0775" }, { "category": "external", "summary": "SUSE Bug 1219053 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219053" }, { "category": "external", "summary": "SUSE Bug 1219082 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1219082" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-0775", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-1085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1085" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1085", "url": "https://www.suse.com/security/cve/CVE-2024-1085" }, { "category": "external", "summary": "SUSE Bug 1219429 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219429" }, { "category": "external", "summary": "SUSE Bug 1219432 for CVE-2024-1085", "url": "https://bugzilla.suse.com/1219432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-1086" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-1086", "url": "https://www.suse.com/security/cve/CVE-2024-1086" }, { "category": "external", "summary": "SUSE Bug 1219434 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219434" }, { "category": "external", "summary": "SUSE Bug 1219435 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1219435" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1224878" }, { "category": "external", "summary": "SUSE Bug 1226066 for CVE-2024-1086", "url": "https://bugzilla.suse.com/1226066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "important" } ], "title": "CVE-2024-1086" }, { "cve": "CVE-2024-24860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-24860" } ], "notes": [ { "category": "general", "text": "A race condition was found in the Linux kernel\u0027s bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-24860", "url": "https://www.suse.com/security/cve/CVE-2024-24860" }, { "category": "external", "summary": "SUSE Bug 1219608 for CVE-2024-24860", "url": "https://bugzilla.suse.com/1219608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.49.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.49.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.49.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-02-15T15:04:35Z", "details": "moderate" } ], "title": "CVE-2024-24860" } ] }
ssa-613116
Vulnerability from csaf_siemens
Published
2025-08-12 00:00
Modified
2025-08-12 00:00
Summary
SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1
Notes
Summary
SINEC OS before V3.1 contains third-party components with multiple vulnerabilities.
Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SINEC OS before V3.1 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html" }, { "category": "self", "summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-613116.json" } ], "title": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1", "tracking": { "current_release_date": "2025-08-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-613116", "initial_release_date": "2025-08-12T00:00:00Z", "revision_history": [ { "date": "2025-08-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.1", "product": { "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK6242-6PA00" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RST2428P (6GK6242-6PA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.1", "product": { "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family", "product_id": "2" } } ], "category": "product_name", "name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family" }, { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c3.1", "product": { "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family", "product_id": "3" } } ], "category": "product_name", "name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-48935", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: unregister flowtable hooks on netns exit", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2022-48935" }, { "cve": "CVE-2023-3567", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-3567" }, { "cve": "CVE-2023-5178", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-5178" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-6040", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6121", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6606", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-35827", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-35827" }, { "cve": "CVE-2023-39198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-39198" }, { "cve": "CVE-2023-45863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-45863" }, { "cve": "CVE-2023-46343", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-46343" }, { "cve": "CVE-2023-51779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-51779" }, { "cve": "CVE-2023-51780", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-51780" }, { "cve": "CVE-2023-51781", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-51781" }, { "cve": "CVE-2023-51782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-51782" }, { "cve": "CVE-2023-52340", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52340" }, { "cve": "CVE-2023-52433", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52433" }, { "cve": "CVE-2023-52435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: prevent mss overflow in skb_segment()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52435" }, { "cve": "CVE-2023-52475", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: powermate - fix use-after-free in powermate_config_complete", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52475" }, { "cve": "CVE-2023-52477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: hub: Guard against accesses to uninitialized BOS descriptors", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52477" }, { "cve": "CVE-2023-52478", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52478" }, { "cve": "CVE-2023-52486", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm: Don\u0027t unref the same fb many times by mistake due to deadlock handling", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52486" }, { "cve": "CVE-2023-52502", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52502" }, { "cve": "CVE-2023-52504", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/alternatives: Disable KASAN in apply_alternatives()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52504" }, { "cve": "CVE-2023-52507", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: assert requested protocol is valid", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52507" }, { "cve": "CVE-2023-52509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nravb: Fix use-after-free issue in ravb_tx_timeout_work()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52509" }, { "cve": "CVE-2023-52510", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nieee802154: ca8210: Fix a potential UAF in ca8210_probe", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52510" }, { "cve": "CVE-2023-52581", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: fix memleak when more than 255 elements expired", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52581" }, { "cve": "CVE-2023-52583", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nceph: fix deadlock or deadcode of misusing dget()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52583" }, { "cve": "CVE-2023-52587", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/ipoib: Fix mcast list locking", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52587" }, { "cve": "CVE-2023-52594", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52594" }, { "cve": "CVE-2023-52595", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: rt2x00: restart beacon queue when hardware reset", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52595" }, { "cve": "CVE-2023-52597", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: s390: fix setting of fpc register", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52597" }, { "cve": "CVE-2023-52598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/ptrace: handle setting of fpc register correctly", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52598" }, { "cve": "CVE-2023-52599", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diNewExt", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52599" }, { "cve": "CVE-2023-52600", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix uaf in jfs_evict_inode", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52600" }, { "cve": "CVE-2023-52601", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbAdjTree", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52601" }, { "cve": "CVE-2023-52602", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix slab-out-of-bounds Read in dtSearch", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52602" }, { "cve": "CVE-2023-52603", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUBSAN: array-index-out-of-bounds in dtSplitRoot", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52603" }, { "cve": "CVE-2023-52604", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nFS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52604" }, { "cve": "CVE-2023-52606", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/lib: Validate size for vector operations", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52606" }, { "cve": "CVE-2023-52607", "cwe": { "id": "CWE-395", "name": "Use of NullPointerException Catch to Detect NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52607" }, { "cve": "CVE-2023-52615", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52615" }, { "cve": "CVE-2023-52617", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPCI: switchtec: Fix stdev_release() crash after surprise hot remove", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52617" }, { "cve": "CVE-2023-52619", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npstore/ram: Fix crash when setting number of cpus to an odd number", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52619" }, { "cve": "CVE-2023-52622", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52622" }, { "cve": "CVE-2023-52623", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nSUNRPC: Fix a suspicious RCU usage warning", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52623" }, { "cve": "CVE-2023-52637", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncan: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52637" }, { "cve": "CVE-2023-52654", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nio_uring/af_unix: disable sending io_uring over sockets", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52654" }, { "cve": "CVE-2023-52655", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: aqc111: check packet for fixup for true limit", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52655" }, { "cve": "CVE-2023-52670", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrpmsg: virtio: Free driver_override when rpmsg_remove()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52670" }, { "cve": "CVE-2023-52753", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Avoid NULL dereference of timing generator", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52753" }, { "cve": "CVE-2023-52764", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52764" }, { "cve": "CVE-2023-52774", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/dasd: protect device queue against concurrent access", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52774" }, { "cve": "CVE-2023-52784", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbonding: stop the device in bond_setup_by_slave()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52784" }, { "cve": "CVE-2023-52789", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntty: vcc: Add check for kstrdup() in vcc_probe()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52789" }, { "cve": "CVE-2023-52791", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: core: Run atomic i2c xfer when !preemptible", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52791" }, { "cve": "CVE-2023-52796", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipvlan: add ipvlan_route_v6_outbound() helper", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52796" }, { "cve": "CVE-2023-52799", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbFindLeaf", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52799" }, { "cve": "CVE-2023-52804", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add validity check for db_maxag and db_agpref", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52804" }, { "cve": "CVE-2023-52805", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diAlloc", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52805" }, { "cve": "CVE-2023-52806", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: hda: Fix possible null-ptr-deref when assigning a stream", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52806" }, { "cve": "CVE-2023-52809", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52809" }, { "cve": "CVE-2023-52810", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add check for negative db_l2nbperpage", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52810" }, { "cve": "CVE-2023-52813", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: pcrypt - Fix hungtask for PADATA_RESET", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52813" }, { "cve": "CVE-2023-52817", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52817" }, { "cve": "CVE-2023-52818", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52818" }, { "cve": "CVE-2023-52819", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52819" }, { "cve": "CVE-2023-52832", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52832" }, { "cve": "CVE-2023-52835", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nperf/core: Bail out early if the request AUX area is out of bound", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52835" }, { "cve": "CVE-2023-52836", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nlocking/ww_mutex/test: Fix potential workqueue corruption", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52836" }, { "cve": "CVE-2023-52838", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: imsttfb: fix a resource leak in probe", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52838" }, { "cve": "CVE-2023-52840", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52840" }, { "cve": "CVE-2023-52843", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: verify mac len before reading mac header", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52843" }, { "cve": "CVE-2023-52845", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52845" }, { "cve": "CVE-2023-52847", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: bttv: fix use after free error due to btv-\u003etimeout timer", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52847" }, { "cve": "CVE-2023-52853", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhid: cp2112: Fix duplicate workqueue initialization", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52853" }, { "cve": "CVE-2023-52855", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52855" }, { "cve": "CVE-2023-52858", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52858" }, { "cve": "CVE-2023-52864", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nplatform/x86: wmi: Fix opening of char device", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52864" }, { "cve": "CVE-2023-52865", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52865" }, { "cve": "CVE-2023-52867", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/radeon: possible buffer overflow", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52867" }, { "cve": "CVE-2023-52868", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nthermal: core: prevent potential string overflow", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52868" }, { "cve": "CVE-2023-52871", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsoc: qcom: llcc: Handle a second device without data corruption", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52871" }, { "cve": "CVE-2023-52873", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52873" }, { "cve": "CVE-2023-52875", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52875" }, { "cve": "CVE-2023-52876", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52876" }, { "cve": "CVE-2023-52879", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Have trace_event_file have ref counters", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52879" }, { "cve": "CVE-2023-52881", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: do not accept ACK of bytes we never sent", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52881" }, { "cve": "CVE-2023-52919", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: fix possible NULL pointer dereference in send_acknowledge()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2023-52919" }, { "cve": "CVE-2024-0193", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-0193" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-0646", "cwe": { "id": "CWE-1314", "name": "Missing Write Protection for Parametric Data Values" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-0646" }, { "cve": "CVE-2024-0841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-0841" }, { "cve": "CVE-2024-1086", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-1086" }, { "cve": "CVE-2024-26581", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip end interval element from gc", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26581" }, { "cve": "CVE-2024-26593", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: i801: Fix block process call transactions", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26593" }, { "cve": "CVE-2024-26598", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26598" }, { "cve": "CVE-2024-26600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26600" }, { "cve": "CVE-2024-26602", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsched/membarrier: reduce the ability to hammer on sys_membarrier", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26602" }, { "cve": "CVE-2024-26606", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbinder: signal epoll threads of self-work", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26606" }, { "cve": "CVE-2024-26615", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26615" }, { "cve": "CVE-2024-26625", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: call sock_orphan() at release time", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26625" }, { "cve": "CVE-2024-26635", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: Drop support for ETH_P_TR_802_2.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26635" }, { "cve": "CVE-2024-26636", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: make llc_ui_sendmsg() more robust against bonding changes", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26636" }, { "cve": "CVE-2024-26645", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26645" }, { "cve": "CVE-2024-26663", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26663" }, { "cve": "CVE-2024-26664", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwmon: (coretemp) Fix out-of-bounds memory access", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26664" }, { "cve": "CVE-2024-26671", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26671" }, { "cve": "CVE-2024-26673", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26673" }, { "cve": "CVE-2024-26675", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp_async: limit MRU to 64K", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26675" }, { "cve": "CVE-2024-26679", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26679" }, { "cve": "CVE-2024-26684", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26684" }, { "cve": "CVE-2024-26685", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential bug in end_buffer_async_write", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26685" }, { "cve": "CVE-2024-26688", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26688" }, { "cve": "CVE-2024-26696", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26696" }, { "cve": "CVE-2024-26697", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix data corruption in dsync block recovery for small block sizes", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26697" }, { "cve": "CVE-2024-26702", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26702" }, { "cve": "CVE-2024-26704", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: fix double-free of blocks due to wrong extents moved_len", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26704" }, { "cve": "CVE-2024-26720", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26720" }, { "cve": "CVE-2024-26722", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26722" }, { "cve": "CVE-2024-26735", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: sr: fix possible use-after-free and null-ptr-deref", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26735" }, { "cve": "CVE-2024-26736", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nafs: Increase buffer size in afs_update_volume_status()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26736" }, { "cve": "CVE-2024-26748", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fix memory double free when handle zero packet", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26748" }, { "cve": "CVE-2024-26749", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26749" }, { "cve": "CVE-2024-26751", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: ep93xx: Add terminator to gpiod_lookup_table", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26751" }, { "cve": "CVE-2024-26752", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nl2tp: pass correct message length to ip6_append_data", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26752" }, { "cve": "CVE-2024-26754", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26754" }, { "cve": "CVE-2024-26763", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm-crypt: don\u0027t modify the data when using authenticated encryption", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26763" }, { "cve": "CVE-2024-26764", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26764" }, { "cve": "CVE-2024-26766", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26766" }, { "cve": "CVE-2024-26772", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26772" }, { "cve": "CVE-2024-26773", "cwe": { "id": "CWE-413", "name": "Improper Resource Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26773" }, { "cve": "CVE-2024-26777", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26777" }, { "cve": "CVE-2024-26778", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: savage: Error out if pixclock equals zero", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26778" }, { "cve": "CVE-2024-26779", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: fix race condition on enabling fast-xmit", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26779" }, { "cve": "CVE-2024-26788", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: init irq after reg initialization", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26788" }, { "cve": "CVE-2024-26790", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26790" }, { "cve": "CVE-2024-26791", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: dev-replace: properly validate device names", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26791" }, { "cve": "CVE-2024-26793", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26793" }, { "cve": "CVE-2024-26801", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: Avoid potential use-after-free in hci_error_reset", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26801" }, { "cve": "CVE-2024-26804", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: ip_tunnel: prevent perpetual headroom growth", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26804" }, { "cve": "CVE-2024-26805", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26805" }, { "cve": "CVE-2024-26825", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26825" }, { "cve": "CVE-2024-26835", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26835" }, { "cve": "CVE-2024-26839", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix a memleak in init_credit_return", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26839" }, { "cve": "CVE-2024-26840", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncachefiles: fix memory leak in cachefiles_add_cache()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26840" }, { "cve": "CVE-2024-26845", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Add TMF to tmr_list handling", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26845" }, { "cve": "CVE-2024-26910", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: ipset: fix performance regression in swap operation", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-26910" }, { "cve": "CVE-2024-27405", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27405" }, { "cve": "CVE-2024-27410", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: nl80211: reject iftype change with mesh ID change", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27410" }, { "cve": "CVE-2024-27412", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npower: supply: bq27xxx-i2c: Do not free non existing IRQ", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27412" }, { "cve": "CVE-2024-27413", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nefi/capsule-loader: fix incorrect allocation size", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27413" }, { "cve": "CVE-2024-27414", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27414" }, { "cve": "CVE-2024-27416", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27416" }, { "cve": "CVE-2024-27417", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-27417" }, { "cve": "CVE-2024-35833", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-35833" }, { "cve": "CVE-2024-35835", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5e: fix a double-free in arfs_create_groups", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-35835" }, { "cve": "CVE-2024-39476", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.1 or later version", "product_ids": [ "1", "2", "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3" ] } ], "title": "CVE-2024-39476" } ] }
fkie_cve-2023-51782
Vulnerability from fkie_nvd
Published
2024-01-11 19:15
Modified
2024-11-21 08:38
Severity ?
Summary
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8 | Release Notes | |
cve@mitre.org | https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53 | Patch | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html | Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 6.7 | |
linux | linux_kernel | 6.7 | |
linux | linux_kernel | 6.7 | |
linux | linux_kernel | 6.7 | |
linux | linux_kernel | 6.7 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C35A7D-82A5-436F-925A-384D92679784", "versionEndExcluding": "6.6.8", "versionStartExcluding": "2.6.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", "matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*", "matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*", "matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en el kernel de Linux anterior a 6.6.8. rose_ioctl en net/rose/af_rose.c tiene un use after free debido a una condici\u00f3n de ejecuci\u00f3n rose_accept." } ], "id": "CVE-2023-51782", "lastModified": "2024-11-21T08:38:47.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-11T19:15:12.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6hcj-vfvx-mmcm
Vulnerability from github
Published
2024-01-11 21:31
Modified
2024-01-18 21:30
Severity ?
VLAI Severity ?
Details
An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
{ "affected": [], "aliases": [ "CVE-2023-51782" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-11T19:15:12Z", "severity": "HIGH" }, "details": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "id": "GHSA-6hcj-vfvx-mmcm", "modified": "2024-01-18T21:30:27Z", "published": "2024-01-11T21:31:19Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51782" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…