{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-28464: Fixed use-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).\n- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).\n- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n\nThe following non-security bugs were fixed:\n\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- net: ena: optimize data access in fast-path code (bsc#1208137).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2023-1892,SUSE-SLE-Module-RT-15-SP3-2023-1892,SUSE-SUSE-MicroOS-5.1-2023-1892,SUSE-SUSE-MicroOS-5.2-2023-1892","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1892-1.json"},{"category":"self","summary":"URL for SUSE-SU-2023:1892-1","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20231892-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2023:1892-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html"},{"category":"self","summary":"SUSE Bug 1207168","url":"https://bugzilla.suse.com/1207168"},{"category":"self","summary":"SUSE Bug 1208137","url":"https://bugzilla.suse.com/1208137"},{"category":"self","summary":"SUSE Bug 1208598","url":"https://bugzilla.suse.com/1208598"},{"category":"self","summary":"SUSE Bug 1208601","url":"https://bugzilla.suse.com/1208601"},{"category":"self","summary":"SUSE Bug 1208787","url":"https://bugzilla.suse.com/1208787"},{"category":"self","summary":"SUSE Bug 1209052","url":"https://bugzilla.suse.com/1209052"},{"category":"self","summary":"SUSE Bug 1209256","url":"https://bugzilla.suse.com/1209256"},{"category":"self","summary":"SUSE Bug 1209288","url":"https://bugzilla.suse.com/1209288"},{"category":"self","summary":"SUSE Bug 1209289","url":"https://bugzilla.suse.com/1209289"},{"category":"self","summary":"SUSE Bug 1209290","url":"https://bugzilla.suse.com/1209290"},{"category":"self","summary":"SUSE Bug 1209291","url":"https://bugzilla.suse.com/1209291"},{"category":"self","summary":"SUSE Bug 1209366","url":"https://bugzilla.suse.com/1209366"},{"category":"self","summary":"SUSE Bug 1209532","url":"https://bugzilla.suse.com/1209532"},{"category":"self","summary":"SUSE Bug 1209547","url":"https://bugzilla.suse.com/1209547"},{"category":"self","summary":"SUSE Bug 1209549","url":"https://bugzilla.suse.com/1209549"},{"category":"self","summary":"SUSE Bug 1209634","url":"https://bugzilla.suse.com/1209634"},{"category":"self","summary":"SUSE Bug 1209635","url":"https://bugzilla.suse.com/1209635"},{"category":"self","summary":"SUSE Bug 1209636","url":"https://bugzilla.suse.com/1209636"},{"category":"self","summary":"SUSE Bug 1209778","url":"https://bugzilla.suse.com/1209778"},{"category":"self","summary":"SUSE Bug 1209785","url":"https://bugzilla.suse.com/1209785"},{"category":"self","summary":"SUSE CVE CVE-2017-5753 page","url":"https://www.suse.com/security/cve/CVE-2017-5753/"},{"category":"self","summary":"SUSE CVE CVE-2021-3923 page","url":"https://www.suse.com/security/cve/CVE-2021-3923/"},{"category":"self","summary":"SUSE CVE CVE-2022-4744 page","url":"https://www.suse.com/security/cve/CVE-2022-4744/"},{"category":"self","summary":"SUSE CVE CVE-2023-0394 page","url":"https://www.suse.com/security/cve/CVE-2023-0394/"},{"category":"self","summary":"SUSE CVE CVE-2023-0461 page","url":"https://www.suse.com/security/cve/CVE-2023-0461/"},{"category":"self","summary":"SUSE CVE CVE-2023-1075 page","url":"https://www.suse.com/security/cve/CVE-2023-1075/"},{"category":"self","summary":"SUSE CVE CVE-2023-1078 page","url":"https://www.suse.com/security/cve/CVE-2023-1078/"},{"category":"self","summary":"SUSE CVE CVE-2023-1281 page","url":"https://www.suse.com/security/cve/CVE-2023-1281/"},{"category":"self","summary":"SUSE CVE CVE-2023-1382 page","url":"https://www.suse.com/security/cve/CVE-2023-1382/"},{"category":"self","summary":"SUSE CVE CVE-2023-1390 page","url":"https://www.suse.com/security/cve/CVE-2023-1390/"},{"category":"self","summary":"SUSE CVE CVE-2023-1513 page","url":"https://www.suse.com/security/cve/CVE-2023-1513/"},{"category":"self","summary":"SUSE CVE CVE-2023-1582 page","url":"https://www.suse.com/security/cve/CVE-2023-1582/"},{"category":"self","summary":"SUSE CVE CVE-2023-28327 page","url":"https://www.suse.com/security/cve/CVE-2023-28327/"},{"category":"self","summary":"SUSE CVE CVE-2023-28328 page","url":"https://www.suse.com/security/cve/CVE-2023-28328/"},{"category":"self","summary":"SUSE CVE CVE-2023-28464 page","url":"https://www.suse.com/security/cve/CVE-2023-28464/"},{"category":"self","summary":"SUSE CVE CVE-2023-28466 page","url":"https://www.suse.com/security/cve/CVE-2023-28466/"},{"category":"self","summary":"SUSE CVE CVE-2023-28772 page","url":"https://www.suse.com/security/cve/CVE-2023-28772/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2023-07-06T01:58:50Z","generator":{"date":"2023-07-06T01:58:50Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2023:1892-1","initial_release_date":"2023-07-06T01:58:50Z","revision_history":[{"date":"2023-07-06T01:58:50Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-devel-rt-5.3.18-150300.124.1.noarch","product":{"name":"kernel-devel-rt-5.3.18-150300.124.1.noarch","product_id":"kernel-devel-rt-5.3.18-150300.124.1.noarch"}},{"category":"product_version","name":"kernel-source-rt-5.3.18-150300.124.1.noarch","product":{"name":"kernel-source-rt-5.3.18-150300.124.1.noarch","product_id":"kernel-source-rt-5.3.18-150300.124.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"dlm-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"dlm-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"gfs2-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt-devel-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt-devel-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt-devel-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt-extra-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt-extra-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt-extra-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt-optional-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt-optional-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt-optional-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64","product_id":"kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kernel-syms-rt-5.3.18-150300.124.1.x86_64","product":{"name":"kernel-syms-rt-5.3.18-150300.124.1.x86_64","product_id":"kernel-syms-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"kselftests-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"kselftests-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64","product":{"name":"reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64","product_id":"reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64"}},{"category":"product_version","name":"reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product":{"name":"reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64","product_id":"reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Real Time Module 15 SP3","product":{"name":"SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-module-rt:15:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.1","product":{"name":"SUSE Linux Enterprise Micro 5.1","product_id":"SUSE Linux Enterprise Micro 5.1","product_identification_helper":{"cpe":"cpe:/o:suse:suse-microos:5.1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.2","product":{"name":"SUSE Linux Enterprise Micro 5.2","product_id":"SUSE Linux Enterprise Micro 5.2","product_identification_helper":{"cpe":"cpe:/o:suse:suse-microos:5.2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"dlm-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"dlm-kmp-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"gfs2-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-rt-5.3.18-150300.124.1.noarch as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch"},"product_reference":"kernel-devel-rt-5.3.18-150300.124.1.noarch","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-devel-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-rt-devel-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-rt-5.3.18-150300.124.1.noarch as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch"},"product_reference":"kernel-source-rt-5.3.18-150300.124.1.noarch","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-syms-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1","product_id":"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2","product_id":"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.124.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.2"}]},"vulnerabilities":[{"cve":"CVE-2017-5753","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5753"}],"notes":[{"category":"general","text":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5753","url":"https://www.suse.com/security/cve/CVE-2017-5753"},{"category":"external","summary":"SUSE Bug 1068032 for CVE-2017-5753","url":"https://bugzilla.suse.com/1068032"},{"category":"external","summary":"SUSE Bug 1074562 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074562"},{"category":"external","summary":"SUSE Bug 1074578 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074578"},{"category":"external","summary":"SUSE Bug 1074701 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074701"},{"category":"external","summary":"SUSE Bug 1075006 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075006"},{"category":"external","summary":"SUSE Bug 1075419 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075419"},{"category":"external","summary":"SUSE Bug 1075748 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075748"},{"category":"external","summary":"SUSE Bug 1080039 for CVE-2017-5753","url":"https://bugzilla.suse.com/1080039"},{"category":"external","summary":"SUSE Bug 1087084 for CVE-2017-5753","url":"https://bugzilla.suse.com/1087084"},{"category":"external","summary":"SUSE Bug 1087939 for CVE-2017-5753","url":"https://bugzilla.suse.com/1087939"},{"category":"external","summary":"SUSE Bug 1089055 for CVE-2017-5753","url":"https://bugzilla.suse.com/1089055"},{"category":"external","summary":"SUSE Bug 1136865 for CVE-2017-5753","url":"https://bugzilla.suse.com/1136865"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2017-5753","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2017-5753","url":"https://bugzilla.suse.com/1201877"},{"category":"external","summary":"SUSE Bug 1209547 for CVE-2017-5753","url":"https://bugzilla.suse.com/1209547"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2017-5753"},{"cve":"CVE-2021-3923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-3923"}],"notes":[{"category":"general","text":"A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-3923","url":"https://www.suse.com/security/cve/CVE-2021-3923"},{"category":"external","summary":"SUSE Bug 1209778 for CVE-2021-3923","url":"https://bugzilla.suse.com/1209778"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"low"}],"title":"CVE-2021-3923"},{"cve":"CVE-2022-4744","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-4744"}],"notes":[{"category":"general","text":"A double-free flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-4744","url":"https://www.suse.com/security/cve/CVE-2022-4744"},{"category":"external","summary":"SUSE Bug 1209635 for CVE-2022-4744","url":"https://bugzilla.suse.com/1209635"},{"category":"external","summary":"SUSE Bug 1209672 for CVE-2022-4744","url":"https://bugzilla.suse.com/1209672"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2022-4744","url":"https://bugzilla.suse.com/1211833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2022-4744"},{"cve":"CVE-2023-0394","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-0394"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-0394","url":"https://www.suse.com/security/cve/CVE-2023-0394"},{"category":"external","summary":"SUSE Bug 1207168 for CVE-2023-0394","url":"https://bugzilla.suse.com/1207168"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-0394"},{"cve":"CVE-2023-0461","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-0461"}],"notes":[{"category":"general","text":"There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS  or CONFIG_XFRM_ESPINTCP  has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data  of a struct inet_connection_sock.\n\nWhen CONFIG_TLS  is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt  TCP_ULP  operation does not require any privilege.\n\nWe recommend upgrading past commit  2c02d41d71f90a5168391b6a5f2954112ba2307c","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-0461","url":"https://www.suse.com/security/cve/CVE-2023-0461"},{"category":"external","summary":"SUSE Bug 1208787 for CVE-2023-0461","url":"https://bugzilla.suse.com/1208787"},{"category":"external","summary":"SUSE Bug 1208911 for CVE-2023-0461","url":"https://bugzilla.suse.com/1208911"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-0461","url":"https://bugzilla.suse.com/1211833"},{"category":"external","summary":"SUSE Bug 1217079 for CVE-2023-0461","url":"https://bugzilla.suse.com/1217079"},{"category":"external","summary":"SUSE Bug 1218514 for CVE-2023-0461","url":"https://bugzilla.suse.com/1218514"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-0461"},{"cve":"CVE-2023-1075","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1075"}],"notes":[{"category":"general","text":"A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1075","url":"https://www.suse.com/security/cve/CVE-2023-1075"},{"category":"external","summary":"SUSE Bug 1208598 for CVE-2023-1075","url":"https://bugzilla.suse.com/1208598"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.5,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-1075"},{"cve":"CVE-2023-1078","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1078"}],"notes":[{"category":"general","text":"A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1078","url":"https://www.suse.com/security/cve/CVE-2023-1078"},{"category":"external","summary":"SUSE Bug 1208601 for CVE-2023-1078","url":"https://bugzilla.suse.com/1208601"},{"category":"external","summary":"SUSE Bug 1208603 for CVE-2023-1078","url":"https://bugzilla.suse.com/1208603"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-1078"},{"cve":"CVE-2023-1281","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1281"}],"notes":[{"category":"general","text":"Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation.  The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext.  A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1281","url":"https://www.suse.com/security/cve/CVE-2023-1281"},{"category":"external","summary":"SUSE Bug 1209634 for CVE-2023-1281","url":"https://bugzilla.suse.com/1209634"},{"category":"external","summary":"SUSE Bug 1209683 for CVE-2023-1281","url":"https://bugzilla.suse.com/1209683"},{"category":"external","summary":"SUSE Bug 1210335 for CVE-2023-1281","url":"https://bugzilla.suse.com/1210335"},{"category":"external","summary":"SUSE Bug 1210423 for CVE-2023-1281","url":"https://bugzilla.suse.com/1210423"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-1281","url":"https://bugzilla.suse.com/1211833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-1281"},{"cve":"CVE-2023-1382","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1382"}],"notes":[{"category":"general","text":"A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1382","url":"https://www.suse.com/security/cve/CVE-2023-1382"},{"category":"external","summary":"SUSE Bug 1209288 for CVE-2023-1382","url":"https://bugzilla.suse.com/1209288"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-1382"},{"cve":"CVE-2023-1390","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1390"}],"notes":[{"category":"general","text":"A remote denial of service vulnerability was found in the Linux kernel's TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1390","url":"https://www.suse.com/security/cve/CVE-2023-1390"},{"category":"external","summary":"SUSE Bug 1209289 for CVE-2023-1390","url":"https://bugzilla.suse.com/1209289"},{"category":"external","summary":"SUSE Bug 1210779 for CVE-2023-1390","url":"https://bugzilla.suse.com/1210779"},{"category":"external","summary":"SUSE Bug 1211495 for CVE-2023-1390","url":"https://bugzilla.suse.com/1211495"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-1390"},{"cve":"CVE-2023-1513","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1513"}],"notes":[{"category":"general","text":"A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1513","url":"https://www.suse.com/security/cve/CVE-2023-1513"},{"category":"external","summary":"SUSE Bug 1209532 for CVE-2023-1513","url":"https://bugzilla.suse.com/1209532"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"low"}],"title":"CVE-2023-1513"},{"cve":"CVE-2023-1582","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1582"}],"notes":[{"category":"general","text":"A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1582","url":"https://www.suse.com/security/cve/CVE-2023-1582"},{"category":"external","summary":"SUSE Bug 1209636 for CVE-2023-1582","url":"https://bugzilla.suse.com/1209636"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-1582"},{"cve":"CVE-2023-28327","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28327"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28327","url":"https://www.suse.com/security/cve/CVE-2023-28327"},{"category":"external","summary":"SUSE Bug 1209290 for CVE-2023-28327","url":"https://bugzilla.suse.com/1209290"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-28327"},{"cve":"CVE-2023-28328","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28328"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28328","url":"https://www.suse.com/security/cve/CVE-2023-28328"},{"category":"external","summary":"SUSE Bug 1209291 for CVE-2023-28328","url":"https://bugzilla.suse.com/1209291"},{"category":"external","summary":"SUSE Bug 1222212 for CVE-2023-28328","url":"https://bugzilla.suse.com/1222212"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"moderate"}],"title":"CVE-2023-28328"},{"cve":"CVE-2023-28464","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28464"}],"notes":[{"category":"general","text":"hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28464","url":"https://www.suse.com/security/cve/CVE-2023-28464"},{"category":"external","summary":"SUSE Bug 1209052 for CVE-2023-28464","url":"https://bugzilla.suse.com/1209052"},{"category":"external","summary":"SUSE Bug 1211111 for CVE-2023-28464","url":"https://bugzilla.suse.com/1211111"},{"category":"external","summary":"SUSE Bug 1220130 for CVE-2023-28464","url":"https://bugzilla.suse.com/1220130"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-28464"},{"cve":"CVE-2023-28466","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28466"}],"notes":[{"category":"general","text":"do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28466","url":"https://www.suse.com/security/cve/CVE-2023-28466"},{"category":"external","summary":"SUSE Bug 1209366 for CVE-2023-28466","url":"https://bugzilla.suse.com/1209366"},{"category":"external","summary":"SUSE Bug 1210452 for CVE-2023-28466","url":"https://bugzilla.suse.com/1210452"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-28466","url":"https://bugzilla.suse.com/1211833"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-28466","url":"https://bugzilla.suse.com/1213841"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-28466"},{"cve":"CVE-2023-28772","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28772"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28772","url":"https://www.suse.com/security/cve/CVE-2023-28772"},{"category":"external","summary":"SUSE Bug 1209549 for CVE-2023-28772","url":"https://bugzilla.suse.com/1209549"},{"category":"external","summary":"SUSE Bug 1211110 for CVE-2023-28772","url":"https://bugzilla.suse.com/1211110"},{"category":"external","summary":"SUSE Bug 1214378 for CVE-2023-28772","url":"https://bugzilla.suse.com/1214378"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.4,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-07-06T01:58:50Z","details":"important"}],"title":"CVE-2023-28772"}]}