{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n- CVE-2022-3523: Fixed use after free related to device private page handling (bsc#1204363).\n- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-0597: Fixed lack of randomization of  per-cpu entry area in x86/mm (bsc#1207845).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741).\n- CVE-2023-22998: Fixed misinterpretation of the irtio_gpu_object_shmem_init() return value (bsc#1208776).\n- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).\n- CVE-2023-23004: Fixed misinterpretation of the get_sg_table return value in arm/malidp_planes.c (bsc#1208843).\n- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).\n- CVE-2023-25012: Fixed a use-After-Free in bigben_set_led() in hid (bsc#1207560).\n- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).\n\nThe following non-security bugs were fixed:\n\n- [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes).\n- acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).\n- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).\n- acpica: Drop port I/O validation for some regions (git-fixes).\n- acpica: nsrepair: handle cases without a return value correctly (git-fixes).\n- alsa: hda/ca0132: minor fix for allocation size (git-fixes).\n- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).\n- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).\n- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).\n- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).\n- alsa: ice1712: Do not left ice->gpio_mutex locked in aureon_add_controls() (git-fixes).\n- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).\n- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).\n- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).\n- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).\n- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).\n- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).\n- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).\n- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).\n- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).\n- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).\n- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).\n- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).\n- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).\n- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).\n- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).\n- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).\n- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).\n- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).\n- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).\n- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).\n- arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).\n- arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).\n- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).\n- arm: dts: am5748: keep usb4_tm disabled (git-fixes)\n- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).\n- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).\n- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)\n- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).\n- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)\n- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).\n- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).\n- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).\n- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)\n- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)\n- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).\n- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).\n- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)\n- arm: omap: remove debug-leds driver (git-fixes)\n- arm: remove some dead code (git-fixes)\n- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)\n- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).\n- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)\n- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).\n- ascpi / x86: Add support for LPS0 callback handler (git-fixes).\n- asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).\n- asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).\n- asoc: adau7118: do not disable regulators on device unbind (git-fixes).\n- asoc: cs42l56: fix DT probe (git-fixes).\n- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).\n- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).\n- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).\n- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).\n- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).\n- asoc: rsnd: fixup #endif position (git-fixes).\n- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).\n- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).\n- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).\n- asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).\n- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).\n- avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).\n- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).\n- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).\n- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).\n- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).\n- cifs: Check the lease context if we actually got a lease (bsc#1193629).\n- cifs: Convert struct fealist away from 1-element array (bsc#1193629).\n- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).\n- cifs: Fix oops due to uncleared server->smbd_conn in reconnect (git-fixes).\n- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).\n- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).\n- cifs: Fix use-after-free in rdata->read_into_pages() (git-fixes).\n- cifs: Fix warning and UAF when destroy the MR list (git-fixes).\n- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).\n- cifs: Replace remaining 1-element arrays (bsc#1193629).\n- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).\n- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).\n- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).\n- cifs: fix mount on old smb servers (boo#1206935).\n- cifs: get rid of dns resolve worker (bsc#1193629).\n- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).\n- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).\n- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).\n- cifs: match even the scope id for ipv6 addresses (bsc#1193629).\n- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).\n- cifs: prevent data race in smb2_reconnect() (bsc#1193629).\n- cifs: print last update time for interface list (bsc#1193629).\n- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).\n- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).\n- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).\n- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).\n- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).\n- cifs: use tcon allocation functions even for dummy tcon (git-fixes).\n- cifs: use the least loaded channel for sending requests (bsc#1193629).\n- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).\n- clk: imx: avoid memory leak (git-fixes).\n- clk: mxl: Add option to override gate clks (git-fixes).\n- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).\n- clk: mxl: Remove redundant spinlocks (git-fixes).\n- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).\n- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).\n- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).\n- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).\n- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).\n- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).\n- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).\n- comedi: use menuconfig for main Comedi menu (git-fixes).\n- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).\n- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).\n- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).\n- crypto: essiv - Handle EBUSY correctly (git-fixes).\n- crypto: qat - fix out-of-bounds read (git-fixes).\n- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).\n- crypto: seqiv - Handle EBUSY correctly (git-fixes).\n- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).\n- crypto: xts - Handle EBUSY correctly (git-fixes).\n- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).\n- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).\n- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).\n- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).\n- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).\n- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).\n- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).\n- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).\n- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).\n- docs: gdbmacros: print newest record (git-fixes).\n- documentation: simplify and clarify DCO contribution example language (git-fixes).\n- driver core: fix potential null-ptr-deref in device_add() (git-fixes).\n- driver core: fix resource leak in device_add() (git-fixes).\n- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).\n- drivers: base: transport_class: fix possible memory leak (git-fixes).\n- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).\n- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).\n- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).\n- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).\n- drm/bridge: lt8912b: Add hot plug detection (git-fixes).\n- drm/bridge: lt9611: fix HPD reenablement (git-fixes).\n- drm/bridge: lt9611: fix clock calculation (git-fixes).\n- drm/bridge: lt9611: fix polarity programming (git-fixes).\n- drm/bridge: lt9611: fix programming of video modes (git-fixes).\n- drm/bridge: lt9611: fix sleep mode setup (git-fixes).\n- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).\n- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).\n- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).\n- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).\n- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).\n- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).\n- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).\n- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).\n- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).\n- drm/mediatek: Drop unbalanced obj unref (git-fixes).\n- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).\n- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).\n- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).\n- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).\n- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).\n- drm/msm/dpu: Add check for cstate (git-fixes).\n- drm/msm/dpu: Add check for pstates (git-fixes).\n- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).\n- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).\n- drm/msm/dpu: set pdpu->is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).\n- drm/msm/gem: Add check for kmalloc (git-fixes).\n- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).\n- drm/msm/mdp5: Add check for kzalloc (git-fixes).\n- drm/msm: clean event_thread->worker in case of an error (git-fixes).\n- drm/msm: use strscpy instead of strncpy (git-fixes).\n- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).\n- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).\n- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).\n- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).\n- drm/vc4: hvs: Set AXI panic modes (git-fixes).\n- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).\n- drm/vkms: Fix memory leak in vkms_init() (git-fixes).\n- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).\n- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).\n- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).\n- drm: tidss: Fix pixel format definition (git-fixes).\n- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).\n- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).\n- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).\n- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).\n- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).\n- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).\n- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).\n- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).\n- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).\n- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).\n- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).\n- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).\n- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).\n- gpio: vf610: connect GPIO label to dev name (git-fixes).\n- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).\n- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).\n- hid: asus: use spinlock to protect concurrent accesses (git-fixes).\n- hid: asus: use spinlock to safely schedule workers (git-fixes).\n- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).\n- hid: bigben: use spinlock to safely schedule workers (git-fixes).\n- hid: bigben_probe(): validate report count (git-fixes).\n- hid: bigben_worker() remove unneeded check on report_field (git-fixes).\n- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).\n- hid: elecom: add support for TrackBall 056E:011C (git-fixes).\n- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).\n- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).\n- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).\n- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).\n- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).\n- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).\n- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).\n- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).\n- input: ads7846 - always set last command to PWRDOWN (git-fixes).\n- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).\n- input: ads7846 - do not report pressure for ads7845 (git-fixes).\n- input: iqs269a - configure device with a single block write (git-fixes).\n- input: iqs269a - drop unused device node references (git-fixes).\n- input: iqs269a - increase interrupt handler return delay (git-fixes).\n- input: iqs626a - drop unused device node references (git-fixes).\n- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).\n- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)\n- kabi fix for: nfs: Further optimisations for 'ls -l' (git-fixes).\n- kabi fix for: nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).\n- kabi fix for: nfsv3: handle out-of-order write replies (bsc#1205544).\n- kabi fix for: nfsv4.1 query for fs_location attr on a new file system (Never, kabi).\n- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too.\n- leds: led-class: Add missing put_device() to led_put() (git-fixes).\n- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).\n- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).\n- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).\n- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).\n- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).\n- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).\n- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).\n- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).\n- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).\n- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).\n- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).\n- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).\n- locking: Add missing __sched attributes (bsc#1207270).\n- media: coda: Add check for dcoda_iram_alloc (git-fixes).\n- media: coda: Add check for kmalloc (git-fixes).\n- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).\n- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).\n- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).\n- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).\n- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).\n- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).\n- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).\n- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).\n- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).\n- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).\n- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).\n- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).\n- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).\n- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).\n- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).\n- mfd: cs5535: Do not build on UML (git-fixes).\n- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).\n- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).\n- misc: enclosure: Fix doc for enclosure_find() (git-fixes).\n- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).\n- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).\n- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).\n- move upstreamed i915 and media fixes into sorted section\n- mtd: dataflash: remove duplicate SPI ID table (git-fixes).\n- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).\n- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).\n- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).\n- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).\n- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).\n- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).\n- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).\n- net/rose: Fix to not accept on connected socket (git-fixes).\n- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).\n- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).\n- nfs: Always initialise fattr->label in nfs_fattr_alloc() (git-fixes).\n- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).\n- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).\n- nfs: Further optimisations for 'ls -l' (git-fixes).\n- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).\n- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).\n- nfsd: De-duplicate net_generic(nf->nf_net, nfsd_net_id) (git-fixes).\n- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).\n- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).\n- nfsv3: handle out-of-order write replies (bsc#1205544).\n- nfsv4 expose nfs_parse_server_name function (git-fixes).\n- nfsv4 handle port presence in fs_location server string (git-fixes).\n- nfsv4 only print the label when its queried (git-fixes).\n- nfsv4 remove zero number of fs_locations entries error check (git-fixes).\n- nfsv4 store server support for fs_location attribute (git-fixes).\n- nfsv4.1 query for fs_location attr on a new file system (git-fixes).\n- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).\n- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).\n- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).\n- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).\n- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).\n- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).\n- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).\n- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).\n- nvme-auth: do not override ctrl keys before validation (bsc#1202633).\n- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).\n- nvme-auth: do not use NVMe status codes (bsc#1202633).\n- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).\n- nvme-auth: fix smatch warning complaints (bsc#1202633).\n- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).\n- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).\n- nvme-auth: mark nvme_auth_wq static (bsc#1202633).\n- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).\n- nvme-auth: remove redundant auth_work flush (bsc#1202633).\n- nvme-auth: remove redundant buffer deallocations (bsc#1202633).\n- nvme-auth: remove redundant deallocations (bsc#1202633).\n- nvme-auth: remove redundant if statement (bsc#1202633).\n- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).\n- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).\n- nvme-auth: rename authentication work elements (bsc#1202633).\n- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).\n- nvme-fabrics: show well known discovery name (bsc#1200054).\n- ocfs2: Fix data corruption after failed write (bsc#1208542).\n- pci/ioc: Enlarge virtfn sysfs name buffer (git-fixes).\n- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).\n- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).\n- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).\n- pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).\n- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).\n- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).\n- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).\n- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).\n- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).\n- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).\n- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).\n- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).\n- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).\n- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).\n- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).\n- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).\n- powercap: fix possible name leak in powercap_register_zone() (git-fixes).\n- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).\n- printf: fix errname.c list (git-fixes).\n- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).\n- qede: fix interrupt coalescing configuration (bsc#1205846).\n- refresh patches.suse/ice-clear-stale-Tx-queue-settings-before-configuring.patch. Fix bug introduced by broken backport (bsc#1208628).\n- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).\n- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).\n- revert 'char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol' (git-fixes).\n- revert 'crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete' (git-fixes).\n- revert 'hid: logitech-hidpp: add a module parameter to keep firmware gestures' (git-fixes).\n- revert 'usb: dwc3: qcom: Keep power domain on to retain controller status' (git-fixes).\n- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).\n- rtc: pm8xxx: fix set-alarm race (git-fixes).\n- rtc: sun6i: Always export the internal oscillator (git-fixes).\n- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).\n- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).\n- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).\n- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).\n- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).\n- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).\n- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).\n- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).\n- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).\n- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).\n- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).\n- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).\n- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).\n- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).\n- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).\n- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).\n- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).\n- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).\n- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).\n- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).\n- scsi: qla2xxx: Fix printk() format string (bsc#1208570).\n- scsi: qla2xxx: Fix stalled login (bsc#1208570).\n- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).\n- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (bsc#1208570).\n- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).\n- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).\n- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).\n- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).\n- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).\n- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).\n- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).\n- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).\n- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).\n- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).\n- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).\n- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).\n- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).\n- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).\n- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).\n- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).\n- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).\n- selftests/powerpc: Move perror closer to its use (bsc#1206232).\n- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).\n- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).\n- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).\n- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).\n- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).\n- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).\n- spi: tegra210-quad: Fix validate combined sequence (git-fixes).\n- staging: mt7621-dts: change palmbus address to lower case (git-fixes).\n- struct uvc_device move flush_status new member to end (git-fixes).\n- sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).\n- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).\n- sunrpc: Fix socket waits for write buffer space (git-fixes).\n- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).\n- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).\n- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).\n- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).\n- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).\n- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).\n- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).\n- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).\n- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).\n- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).\n- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).\n- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).\n- update internal module version number for cifs.ko (bsc#1193629).\n- usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).\n- usb: dwc3: core: Host wake up support from system suspend (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).\n- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).\n- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).\n- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).\n- usb: dwc3: qcom: clean up icc init (git-fixes).\n- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).\n- usb: dwc3: qcom: fix gadget-only builds (git-fixes).\n- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).\n- usb: dwc3: qcom: fix wakeup implementation (git-fixes).\n- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).\n- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).\n- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).\n- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).\n- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).\n- usb: max-3421: Fix setting of I/O pins (git-fixes).\n- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).\n- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).\n- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).\n- usb: musb: remove schedule work called after flush (git-fixes).\n- usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).\n- vc_screen: do not clobber return value in vcs_read (git-fixes).\n- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).\n- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).\n- vfs: filename_create(): fix incorrect intent (bsc#1197534).\n- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).\n- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).\n- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).\n- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).\n- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).\n- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).\n- vmci: check context->notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).\n- vmxnet3: move rss code block under eop descriptor (bsc#1208212).\n- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).\n- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).\n- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).\n- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).\n- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).\n- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).\n- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).\n- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).\n- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).\n- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).\n- wifi: cfg80211: Fix use after free for wext (git-fixes).\n- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).\n- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).\n- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).\n- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).\n- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).\n- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).\n- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).\n- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).\n- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).\n- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).\n- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).\n- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).\n- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).\n- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).\n- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).\n- xen-netfront: Fix NULL sring after live migration (git-fixes).\n- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).\n- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)\n- xen/netback: do some code cleanup (git-fixes).\n- xen/netback: fix build warning (git-fixes).\n- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).\n- xen/platform-pci: add missing free_irq() in error path (git-fixes).\n- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2023-749,SUSE-SLE-Micro-5.3-2023-749,SUSE-SLE-Module-Live-Patching-15-SP4-2023-749,SUSE-SLE-Module-RT-15-SP4-2023-749,openSUSE-Leap-Micro-5.3-2023-749,openSUSE-SLE-15.4-2023-749","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0749-1.json"},{"category":"self","summary":"URL for SUSE-SU-2023:0749-1","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230749-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2023:0749-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html"},{"category":"self","summary":"SUSE Bug 1177529","url":"https://bugzilla.suse.com/1177529"},{"category":"self","summary":"SUSE Bug 1193629","url":"https://bugzilla.suse.com/1193629"},{"category":"self","summary":"SUSE Bug 1197534","url":"https://bugzilla.suse.com/1197534"},{"category":"self","summary":"SUSE Bug 1198438","url":"https://bugzilla.suse.com/1198438"},{"category":"self","summary":"SUSE Bug 1200054","url":"https://bugzilla.suse.com/1200054"},{"category":"self","summary":"SUSE Bug 1202633","url":"https://bugzilla.suse.com/1202633"},{"category":"self","summary":"SUSE Bug 1203331","url":"https://bugzilla.suse.com/1203331"},{"category":"self","summary":"SUSE Bug 1204363","url":"https://bugzilla.suse.com/1204363"},{"category":"self","summary":"SUSE Bug 1204993","url":"https://bugzilla.suse.com/1204993"},{"category":"self","summary":"SUSE Bug 1205544","url":"https://bugzilla.suse.com/1205544"},{"category":"self","summary":"SUSE Bug 1205846","url":"https://bugzilla.suse.com/1205846"},{"category":"self","summary":"SUSE Bug 1206103","url":"https://bugzilla.suse.com/1206103"},{"category":"self","summary":"SUSE Bug 1206232","url":"https://bugzilla.suse.com/1206232"},{"category":"self","summary":"SUSE Bug 1206935","url":"https://bugzilla.suse.com/1206935"},{"category":"self","summary":"SUSE Bug 1207051","url":"https://bugzilla.suse.com/1207051"},{"category":"self","summary":"SUSE Bug 1207270","url":"https://bugzilla.suse.com/1207270"},{"category":"self","summary":"SUSE Bug 1207560","url":"https://bugzilla.suse.com/1207560"},{"category":"self","summary":"SUSE Bug 1207845","url":"https://bugzilla.suse.com/1207845"},{"category":"self","summary":"SUSE Bug 1207846","url":"https://bugzilla.suse.com/1207846"},{"category":"self","summary":"SUSE Bug 1208212","url":"https://bugzilla.suse.com/1208212"},{"category":"self","summary":"SUSE Bug 1208420","url":"https://bugzilla.suse.com/1208420"},{"category":"self","summary":"SUSE Bug 1208449","url":"https://bugzilla.suse.com/1208449"},{"category":"self","summary":"SUSE Bug 1208534","url":"https://bugzilla.suse.com/1208534"},{"category":"self","summary":"SUSE Bug 1208541","url":"https://bugzilla.suse.com/1208541"},{"category":"self","summary":"SUSE Bug 1208542","url":"https://bugzilla.suse.com/1208542"},{"category":"self","summary":"SUSE Bug 1208570","url":"https://bugzilla.suse.com/1208570"},{"category":"self","summary":"SUSE Bug 1208607","url":"https://bugzilla.suse.com/1208607"},{"category":"self","summary":"SUSE Bug 1208628","url":"https://bugzilla.suse.com/1208628"},{"category":"self","summary":"SUSE Bug 1208700","url":"https://bugzilla.suse.com/1208700"},{"category":"self","summary":"SUSE Bug 1208741","url":"https://bugzilla.suse.com/1208741"},{"category":"self","summary":"SUSE Bug 1208759","url":"https://bugzilla.suse.com/1208759"},{"category":"self","summary":"SUSE Bug 1208776","url":"https://bugzilla.suse.com/1208776"},{"category":"self","summary":"SUSE Bug 1208784","url":"https://bugzilla.suse.com/1208784"},{"category":"self","summary":"SUSE Bug 1208787","url":"https://bugzilla.suse.com/1208787"},{"category":"self","summary":"SUSE Bug 1208816","url":"https://bugzilla.suse.com/1208816"},{"category":"self","summary":"SUSE Bug 1208837","url":"https://bugzilla.suse.com/1208837"},{"category":"self","summary":"SUSE Bug 1208843","url":"https://bugzilla.suse.com/1208843"},{"category":"self","summary":"SUSE CVE CVE-2022-3523 page","url":"https://www.suse.com/security/cve/CVE-2022-3523/"},{"category":"self","summary":"SUSE CVE CVE-2022-38096 page","url":"https://www.suse.com/security/cve/CVE-2022-38096/"},{"category":"self","summary":"SUSE CVE CVE-2023-0461 page","url":"https://www.suse.com/security/cve/CVE-2023-0461/"},{"category":"self","summary":"SUSE CVE CVE-2023-0597 page","url":"https://www.suse.com/security/cve/CVE-2023-0597/"},{"category":"self","summary":"SUSE CVE CVE-2023-1118 page","url":"https://www.suse.com/security/cve/CVE-2023-1118/"},{"category":"self","summary":"SUSE CVE CVE-2023-22995 page","url":"https://www.suse.com/security/cve/CVE-2023-22995/"},{"category":"self","summary":"SUSE CVE CVE-2023-22998 page","url":"https://www.suse.com/security/cve/CVE-2023-22998/"},{"category":"self","summary":"SUSE CVE CVE-2023-23000 page","url":"https://www.suse.com/security/cve/CVE-2023-23000/"},{"category":"self","summary":"SUSE CVE CVE-2023-23004 page","url":"https://www.suse.com/security/cve/CVE-2023-23004/"},{"category":"self","summary":"SUSE CVE CVE-2023-23559 page","url":"https://www.suse.com/security/cve/CVE-2023-23559/"},{"category":"self","summary":"SUSE CVE CVE-2023-25012 page","url":"https://www.suse.com/security/cve/CVE-2023-25012/"},{"category":"self","summary":"SUSE CVE CVE-2023-26545 page","url":"https://www.suse.com/security/cve/CVE-2023-26545/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2023-03-20T13:27:20Z","generator":{"date":"2023-03-20T13:27:20Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2023:0749-1","initial_release_date":"2023-03-20T13:27:20Z","revision_history":[{"date":"2023-03-20T13:27:20Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64","product":{"name":"kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64","product_id":"kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Live Patching 15 SP4","product":{"name":"SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sle-module-live-patching:15:sp4"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"},"product_reference":"kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP4"}]},"vulnerabilities":[{"cve":"CVE-2022-3523","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-3523"}],"notes":[{"category":"general","text":"A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-3523","url":"https://www.suse.com/security/cve/CVE-2022-3523"},{"category":"external","summary":"SUSE Bug 1204363 for CVE-2022-3523","url":"https://bugzilla.suse.com/1204363"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2022-3523"},{"cve":"CVE-2022-38096","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-38096"}],"notes":[{"category":"general","text":"A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-38096","url":"https://www.suse.com/security/cve/CVE-2022-38096"},{"category":"external","summary":"SUSE Bug 1203331 for CVE-2022-38096","url":"https://bugzilla.suse.com/1203331"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2022-38096"},{"cve":"CVE-2023-0461","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-0461"}],"notes":[{"category":"general","text":"There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS  or CONFIG_XFRM_ESPINTCP  has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data  of a struct inet_connection_sock.\n\nWhen CONFIG_TLS  is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt  TCP_ULP  operation does not require any privilege.\n\nWe recommend upgrading past commit  2c02d41d71f90a5168391b6a5f2954112ba2307c","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-0461","url":"https://www.suse.com/security/cve/CVE-2023-0461"},{"category":"external","summary":"SUSE Bug 1208787 for CVE-2023-0461","url":"https://bugzilla.suse.com/1208787"},{"category":"external","summary":"SUSE Bug 1208911 for CVE-2023-0461","url":"https://bugzilla.suse.com/1208911"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-0461","url":"https://bugzilla.suse.com/1211833"},{"category":"external","summary":"SUSE Bug 1217079 for CVE-2023-0461","url":"https://bugzilla.suse.com/1217079"},{"category":"external","summary":"SUSE Bug 1218514 for CVE-2023-0461","url":"https://bugzilla.suse.com/1218514"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"important"}],"title":"CVE-2023-0461"},{"cve":"CVE-2023-0597","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-0597"}],"notes":[{"category":"general","text":"A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-0597","url":"https://www.suse.com/security/cve/CVE-2023-0597"},{"category":"external","summary":"SUSE Bug 1207845 for CVE-2023-0597","url":"https://bugzilla.suse.com/1207845"},{"category":"external","summary":"SUSE Bug 1212395 for CVE-2023-0597","url":"https://bugzilla.suse.com/1212395"},{"category":"external","summary":"SUSE Bug 1213271 for CVE-2023-0597","url":"https://bugzilla.suse.com/1213271"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-0597"},{"cve":"CVE-2023-1118","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1118"}],"notes":[{"category":"general","text":"A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1118","url":"https://www.suse.com/security/cve/CVE-2023-1118"},{"category":"external","summary":"SUSE Bug 1208837 for CVE-2023-1118","url":"https://bugzilla.suse.com/1208837"},{"category":"external","summary":"SUSE Bug 1208910 for CVE-2023-1118","url":"https://bugzilla.suse.com/1208910"},{"category":"external","summary":"SUSE Bug 1210423 for CVE-2023-1118","url":"https://bugzilla.suse.com/1210423"},{"category":"external","summary":"SUSE Bug 1211495 for CVE-2023-1118","url":"https://bugzilla.suse.com/1211495"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-1118","url":"https://bugzilla.suse.com/1213841"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-1118","url":"https://bugzilla.suse.com/1213842"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"important"}],"title":"CVE-2023-1118"},{"cve":"CVE-2023-22995","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-22995"}],"notes":[{"category":"general","text":"In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-22995","url":"https://www.suse.com/security/cve/CVE-2023-22995"},{"category":"external","summary":"SUSE Bug 1208741 for CVE-2023-22995","url":"https://bugzilla.suse.com/1208741"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-22995"},{"cve":"CVE-2023-22998","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-22998"}],"notes":[{"category":"general","text":"In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-22998","url":"https://www.suse.com/security/cve/CVE-2023-22998"},{"category":"external","summary":"SUSE Bug 1208776 for CVE-2023-22998","url":"https://bugzilla.suse.com/1208776"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-22998"},{"cve":"CVE-2023-23000","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23000"}],"notes":[{"category":"general","text":"In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23000","url":"https://www.suse.com/security/cve/CVE-2023-23000"},{"category":"external","summary":"SUSE Bug 1208816 for CVE-2023-23000","url":"https://bugzilla.suse.com/1208816"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.9,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-23000"},{"cve":"CVE-2023-23004","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23004"}],"notes":[{"category":"general","text":"In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23004","url":"https://www.suse.com/security/cve/CVE-2023-23004"},{"category":"external","summary":"SUSE Bug 1208843 for CVE-2023-23004","url":"https://bugzilla.suse.com/1208843"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-23004"},{"cve":"CVE-2023-23559","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23559"}],"notes":[{"category":"general","text":"In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23559","url":"https://www.suse.com/security/cve/CVE-2023-23559"},{"category":"external","summary":"SUSE Bug 1207051 for CVE-2023-23559","url":"https://bugzilla.suse.com/1207051"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-23559"},{"cve":"CVE-2023-25012","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-25012"}],"notes":[{"category":"general","text":"The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-25012","url":"https://www.suse.com/security/cve/CVE-2023-25012"},{"category":"external","summary":"SUSE Bug 1207560 for CVE-2023-25012","url":"https://bugzilla.suse.com/1207560"},{"category":"external","summary":"SUSE Bug 1207846 for CVE-2023-25012","url":"https://bugzilla.suse.com/1207846"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"moderate"}],"title":"CVE-2023-25012"},{"cve":"CVE-2023-26545","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-26545"}],"notes":[{"category":"general","text":"In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-26545","url":"https://www.suse.com/security/cve/CVE-2023-26545"},{"category":"external","summary":"SUSE Bug 1208700 for CVE-2023-26545","url":"https://bugzilla.suse.com/1208700"},{"category":"external","summary":"SUSE Bug 1208909 for CVE-2023-26545","url":"https://bugzilla.suse.com/1208909"},{"category":"external","summary":"SUSE Bug 1210423 for CVE-2023-26545","url":"https://bugzilla.suse.com/1210423"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-03-20T13:27:20Z","details":"important"}],"title":"CVE-2023-26545"}]}