{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\nThe SUSE Linux Enterprise 11 SP4 LTSS EXTREME CORE kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2023-2506,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-2506","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2506-1.json"},{"category":"self","summary":"URL for SUSE-SU-2023:2506-1","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20232506-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2023:2506-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html"},{"category":"self","summary":"SUSE Bug 1108488","url":"https://bugzilla.suse.com/1108488"},{"category":"self","summary":"SUSE Bug 1204414","url":"https://bugzilla.suse.com/1204414"},{"category":"self","summary":"SUSE Bug 1207036","url":"https://bugzilla.suse.com/1207036"},{"category":"self","summary":"SUSE Bug 1207051","url":"https://bugzilla.suse.com/1207051"},{"category":"self","summary":"SUSE Bug 1207125","url":"https://bugzilla.suse.com/1207125"},{"category":"self","summary":"SUSE Bug 1207795","url":"https://bugzilla.suse.com/1207795"},{"category":"self","summary":"SUSE Bug 1208837","url":"https://bugzilla.suse.com/1208837"},{"category":"self","summary":"SUSE Bug 1209008","url":"https://bugzilla.suse.com/1209008"},{"category":"self","summary":"SUSE Bug 1209256","url":"https://bugzilla.suse.com/1209256"},{"category":"self","summary":"SUSE Bug 1209291","url":"https://bugzilla.suse.com/1209291"},{"category":"self","summary":"SUSE Bug 1209532","url":"https://bugzilla.suse.com/1209532"},{"category":"self","summary":"SUSE Bug 1209871","url":"https://bugzilla.suse.com/1209871"},{"category":"self","summary":"SUSE Bug 1210336","url":"https://bugzilla.suse.com/1210336"},{"category":"self","summary":"SUSE Bug 1210647","url":"https://bugzilla.suse.com/1210647"},{"category":"self","summary":"SUSE Bug 1211186","url":"https://bugzilla.suse.com/1211186"},{"category":"self","summary":"SUSE CVE CVE-2017-5753 page","url":"https://www.suse.com/security/cve/CVE-2017-5753/"},{"category":"self","summary":"SUSE CVE CVE-2018-9517 page","url":"https://www.suse.com/security/cve/CVE-2018-9517/"},{"category":"self","summary":"SUSE CVE CVE-2022-3567 page","url":"https://www.suse.com/security/cve/CVE-2022-3567/"},{"category":"self","summary":"SUSE CVE CVE-2023-0590 page","url":"https://www.suse.com/security/cve/CVE-2023-0590/"},{"category":"self","summary":"SUSE CVE CVE-2023-1118 page","url":"https://www.suse.com/security/cve/CVE-2023-1118/"},{"category":"self","summary":"SUSE CVE CVE-2023-1513 page","url":"https://www.suse.com/security/cve/CVE-2023-1513/"},{"category":"self","summary":"SUSE CVE CVE-2023-1670 page","url":"https://www.suse.com/security/cve/CVE-2023-1670/"},{"category":"self","summary":"SUSE CVE CVE-2023-1989 page","url":"https://www.suse.com/security/cve/CVE-2023-1989/"},{"category":"self","summary":"SUSE CVE CVE-2023-2162 page","url":"https://www.suse.com/security/cve/CVE-2023-2162/"},{"category":"self","summary":"SUSE CVE CVE-2023-23454 page","url":"https://www.suse.com/security/cve/CVE-2023-23454/"},{"category":"self","summary":"SUSE CVE CVE-2023-23455 page","url":"https://www.suse.com/security/cve/CVE-2023-23455/"},{"category":"self","summary":"SUSE CVE CVE-2023-23559 page","url":"https://www.suse.com/security/cve/CVE-2023-23559/"},{"category":"self","summary":"SUSE CVE CVE-2023-28328 page","url":"https://www.suse.com/security/cve/CVE-2023-28328/"},{"category":"self","summary":"SUSE CVE CVE-2023-32269 page","url":"https://www.suse.com/security/cve/CVE-2023-32269/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2023-06-14T07:24:44Z","generator":{"date":"2023-06-14T07:24:44Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2023:2506-1","initial_release_date":"2023-06-14T07:24:44Z","revision_history":[{"date":"2023-06-14T07:24:44Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-debug-3.0.101-108.141.1.i586","product":{"name":"kernel-debug-3.0.101-108.141.1.i586","product_id":"kernel-debug-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-debug-base-3.0.101-108.141.1.i586","product":{"name":"kernel-debug-base-3.0.101-108.141.1.i586","product_id":"kernel-debug-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-debug-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-debug-devel-3.0.101-108.141.1.i586","product_id":"kernel-debug-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-debug-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-debug-extra-3.0.101-108.141.1.i586","product_id":"kernel-debug-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-debug-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-debug-hmac-3.0.101-108.141.1.i586","product_id":"kernel-debug-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-default-3.0.101-108.141.1.i586","product":{"name":"kernel-default-3.0.101-108.141.1.i586","product_id":"kernel-default-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-default-base-3.0.101-108.141.1.i586","product":{"name":"kernel-default-base-3.0.101-108.141.1.i586","product_id":"kernel-default-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-default-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-default-devel-3.0.101-108.141.1.i586","product_id":"kernel-default-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-default-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-default-extra-3.0.101-108.141.1.i586","product_id":"kernel-default-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-default-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-default-hmac-3.0.101-108.141.1.i586","product_id":"kernel-default-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-ec2-3.0.101-108.141.1.i586","product":{"name":"kernel-ec2-3.0.101-108.141.1.i586","product_id":"kernel-ec2-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-ec2-base-3.0.101-108.141.1.i586","product":{"name":"kernel-ec2-base-3.0.101-108.141.1.i586","product_id":"kernel-ec2-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-ec2-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-ec2-devel-3.0.101-108.141.1.i586","product_id":"kernel-ec2-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-ec2-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-ec2-extra-3.0.101-108.141.1.i586","product_id":"kernel-ec2-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-ec2-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-ec2-hmac-3.0.101-108.141.1.i586","product_id":"kernel-ec2-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-pae-3.0.101-108.141.1.i586","product":{"name":"kernel-pae-3.0.101-108.141.1.i586","product_id":"kernel-pae-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-pae-base-3.0.101-108.141.1.i586","product":{"name":"kernel-pae-base-3.0.101-108.141.1.i586","product_id":"kernel-pae-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-pae-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-pae-devel-3.0.101-108.141.1.i586","product_id":"kernel-pae-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-pae-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-pae-extra-3.0.101-108.141.1.i586","product_id":"kernel-pae-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-pae-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-pae-hmac-3.0.101-108.141.1.i586","product_id":"kernel-pae-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.i586","product":{"name":"kernel-source-3.0.101-108.141.1.i586","product_id":"kernel-source-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.i586","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.i586","product_id":"kernel-source-vanilla-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-syms-3.0.101-108.141.1.i586","product":{"name":"kernel-syms-3.0.101-108.141.1.i586","product_id":"kernel-syms-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-trace-3.0.101-108.141.1.i586","product":{"name":"kernel-trace-3.0.101-108.141.1.i586","product_id":"kernel-trace-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-trace-base-3.0.101-108.141.1.i586","product":{"name":"kernel-trace-base-3.0.101-108.141.1.i586","product_id":"kernel-trace-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-trace-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-trace-devel-3.0.101-108.141.1.i586","product_id":"kernel-trace-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-trace-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-trace-extra-3.0.101-108.141.1.i586","product_id":"kernel-trace-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-trace-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-trace-hmac-3.0.101-108.141.1.i586","product_id":"kernel-trace-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-vanilla-3.0.101-108.141.1.i586","product":{"name":"kernel-vanilla-3.0.101-108.141.1.i586","product_id":"kernel-vanilla-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-vanilla-base-3.0.101-108.141.1.i586","product":{"name":"kernel-vanilla-base-3.0.101-108.141.1.i586","product_id":"kernel-vanilla-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-vanilla-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-vanilla-devel-3.0.101-108.141.1.i586","product_id":"kernel-vanilla-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-vanilla-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-vanilla-hmac-3.0.101-108.141.1.i586","product_id":"kernel-vanilla-hmac-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-xen-3.0.101-108.141.1.i586","product":{"name":"kernel-xen-3.0.101-108.141.1.i586","product_id":"kernel-xen-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-xen-base-3.0.101-108.141.1.i586","product":{"name":"kernel-xen-base-3.0.101-108.141.1.i586","product_id":"kernel-xen-base-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-xen-devel-3.0.101-108.141.1.i586","product":{"name":"kernel-xen-devel-3.0.101-108.141.1.i586","product_id":"kernel-xen-devel-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-xen-extra-3.0.101-108.141.1.i586","product":{"name":"kernel-xen-extra-3.0.101-108.141.1.i586","product_id":"kernel-xen-extra-3.0.101-108.141.1.i586"}},{"category":"product_version","name":"kernel-xen-hmac-3.0.101-108.141.1.i586","product":{"name":"kernel-xen-hmac-3.0.101-108.141.1.i586","product_id":"kernel-xen-hmac-3.0.101-108.141.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.ia64","product":{"name":"kernel-source-3.0.101-108.141.1.ia64","product_id":"kernel-source-3.0.101-108.141.1.ia64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.ia64","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.ia64","product_id":"kernel-source-vanilla-3.0.101-108.141.1.ia64"}}],"category":"architecture","name":"ia64"},{"branches":[{"category":"product_version","name":"kernel-docs-3.0.101-108.141.1.noarch","product":{"name":"kernel-docs-3.0.101-108.141.1.noarch","product_id":"kernel-docs-3.0.101-108.141.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.ppc","product":{"name":"kernel-source-3.0.101-108.141.1.ppc","product_id":"kernel-source-3.0.101-108.141.1.ppc"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.ppc","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.ppc","product_id":"kernel-source-vanilla-3.0.101-108.141.1.ppc"}}],"category":"architecture","name":"ppc"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.ppc64","product":{"name":"kernel-source-3.0.101-108.141.1.ppc64","product_id":"kernel-source-3.0.101-108.141.1.ppc64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.ppc64","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.ppc64","product_id":"kernel-source-vanilla-3.0.101-108.141.1.ppc64"}}],"category":"architecture","name":"ppc64"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.s390","product":{"name":"kernel-source-3.0.101-108.141.1.s390","product_id":"kernel-source-3.0.101-108.141.1.s390"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.s390","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.s390","product_id":"kernel-source-vanilla-3.0.101-108.141.1.s390"}}],"category":"architecture","name":"s390"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.s390x","product":{"name":"kernel-source-3.0.101-108.141.1.s390x","product_id":"kernel-source-3.0.101-108.141.1.s390x"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.s390x","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.s390x","product_id":"kernel-source-vanilla-3.0.101-108.141.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"kernel-debug-3.0.101-108.141.1.x86_64","product":{"name":"kernel-debug-3.0.101-108.141.1.x86_64","product_id":"kernel-debug-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-debug-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-debug-base-3.0.101-108.141.1.x86_64","product_id":"kernel-debug-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-debug-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-debug-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-debug-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-debug-extra-3.0.101-108.141.1.x86_64","product":{"name":"kernel-debug-extra-3.0.101-108.141.1.x86_64","product_id":"kernel-debug-extra-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-debug-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-debug-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-debug-hmac-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-default-3.0.101-108.141.1.x86_64","product":{"name":"kernel-default-3.0.101-108.141.1.x86_64","product_id":"kernel-default-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-default-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-default-base-3.0.101-108.141.1.x86_64","product_id":"kernel-default-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-default-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-default-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-default-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-default-extra-3.0.101-108.141.1.x86_64","product":{"name":"kernel-default-extra-3.0.101-108.141.1.x86_64","product_id":"kernel-default-extra-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-default-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-default-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-default-hmac-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-3.0.101-108.141.1.x86_64","product":{"name":"kernel-ec2-3.0.101-108.141.1.x86_64","product_id":"kernel-ec2-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-ec2-base-3.0.101-108.141.1.x86_64","product_id":"kernel-ec2-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-ec2-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-ec2-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-extra-3.0.101-108.141.1.x86_64","product":{"name":"kernel-ec2-extra-3.0.101-108.141.1.x86_64","product_id":"kernel-ec2-extra-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-ec2-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-ec2-hmac-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-source-3.0.101-108.141.1.x86_64","product":{"name":"kernel-source-3.0.101-108.141.1.x86_64","product_id":"kernel-source-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.141.1.x86_64","product":{"name":"kernel-source-vanilla-3.0.101-108.141.1.x86_64","product_id":"kernel-source-vanilla-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-syms-3.0.101-108.141.1.x86_64","product":{"name":"kernel-syms-3.0.101-108.141.1.x86_64","product_id":"kernel-syms-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-trace-3.0.101-108.141.1.x86_64","product":{"name":"kernel-trace-3.0.101-108.141.1.x86_64","product_id":"kernel-trace-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-trace-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-trace-base-3.0.101-108.141.1.x86_64","product_id":"kernel-trace-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-trace-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-trace-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-trace-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-trace-extra-3.0.101-108.141.1.x86_64","product":{"name":"kernel-trace-extra-3.0.101-108.141.1.x86_64","product_id":"kernel-trace-extra-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-trace-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-trace-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-trace-hmac-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-3.0.101-108.141.1.x86_64","product":{"name":"kernel-vanilla-3.0.101-108.141.1.x86_64","product_id":"kernel-vanilla-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-vanilla-base-3.0.101-108.141.1.x86_64","product_id":"kernel-vanilla-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-vanilla-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-vanilla-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-vanilla-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-vanilla-hmac-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-xen-3.0.101-108.141.1.x86_64","product":{"name":"kernel-xen-3.0.101-108.141.1.x86_64","product_id":"kernel-xen-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-xen-base-3.0.101-108.141.1.x86_64","product":{"name":"kernel-xen-base-3.0.101-108.141.1.x86_64","product_id":"kernel-xen-base-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-xen-devel-3.0.101-108.141.1.x86_64","product":{"name":"kernel-xen-devel-3.0.101-108.141.1.x86_64","product_id":"kernel-xen-devel-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-xen-extra-3.0.101-108.141.1.x86_64","product":{"name":"kernel-xen-extra-3.0.101-108.141.1.x86_64","product_id":"kernel-xen-extra-3.0.101-108.141.1.x86_64"}},{"category":"product_version","name":"kernel-xen-hmac-3.0.101-108.141.1.x86_64","product":{"name":"kernel-xen-hmac-3.0.101-108.141.1.x86_64","product_id":"kernel-xen-hmac-3.0.101-108.141.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product":{"name":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-default-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-default-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-default-base-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-default-devel-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-ec2-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-base-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-ec2-base-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-devel-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-ec2-devel-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-source-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-syms-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-trace-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-base-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-trace-base-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-devel-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-trace-devel-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-xen-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-base-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-xen-base-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-devel-3.0.101-108.141.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"},"product_reference":"kernel-xen-devel-3.0.101-108.141.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"}]},"vulnerabilities":[{"cve":"CVE-2017-5753","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-5753"}],"notes":[{"category":"general","text":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-5753","url":"https://www.suse.com/security/cve/CVE-2017-5753"},{"category":"external","summary":"SUSE Bug 1068032 for CVE-2017-5753","url":"https://bugzilla.suse.com/1068032"},{"category":"external","summary":"SUSE Bug 1074562 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074562"},{"category":"external","summary":"SUSE Bug 1074578 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074578"},{"category":"external","summary":"SUSE Bug 1074701 for CVE-2017-5753","url":"https://bugzilla.suse.com/1074701"},{"category":"external","summary":"SUSE Bug 1075006 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075006"},{"category":"external","summary":"SUSE Bug 1075419 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075419"},{"category":"external","summary":"SUSE Bug 1075748 for CVE-2017-5753","url":"https://bugzilla.suse.com/1075748"},{"category":"external","summary":"SUSE Bug 1080039 for CVE-2017-5753","url":"https://bugzilla.suse.com/1080039"},{"category":"external","summary":"SUSE Bug 1087084 for CVE-2017-5753","url":"https://bugzilla.suse.com/1087084"},{"category":"external","summary":"SUSE Bug 1087939 for CVE-2017-5753","url":"https://bugzilla.suse.com/1087939"},{"category":"external","summary":"SUSE Bug 1089055 for CVE-2017-5753","url":"https://bugzilla.suse.com/1089055"},{"category":"external","summary":"SUSE Bug 1136865 for CVE-2017-5753","url":"https://bugzilla.suse.com/1136865"},{"category":"external","summary":"SUSE Bug 1178658 for CVE-2017-5753","url":"https://bugzilla.suse.com/1178658"},{"category":"external","summary":"SUSE Bug 1201877 for CVE-2017-5753","url":"https://bugzilla.suse.com/1201877"},{"category":"external","summary":"SUSE Bug 1209547 for CVE-2017-5753","url":"https://bugzilla.suse.com/1209547"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2017-5753"},{"cve":"CVE-2018-9517","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-9517"}],"notes":[{"category":"general","text":"In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-9517","url":"https://www.suse.com/security/cve/CVE-2018-9517"},{"category":"external","summary":"SUSE Bug 1108488 for CVE-2018-9517","url":"https://bugzilla.suse.com/1108488"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":2.5,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"low"}],"title":"CVE-2018-9517"},{"cve":"CVE-2022-3567","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-3567"}],"notes":[{"category":"general","text":"A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-3567","url":"https://www.suse.com/security/cve/CVE-2022-3567"},{"category":"external","summary":"SUSE Bug 1204414 for CVE-2022-3567","url":"https://bugzilla.suse.com/1204414"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"moderate"}],"title":"CVE-2022-3567"},{"cve":"CVE-2023-0590","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-0590"}],"notes":[{"category":"general","text":"A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-0590","url":"https://www.suse.com/security/cve/CVE-2023-0590"},{"category":"external","summary":"SUSE Bug 1207036 for CVE-2023-0590","url":"https://bugzilla.suse.com/1207036"},{"category":"external","summary":"SUSE Bug 1207795 for CVE-2023-0590","url":"https://bugzilla.suse.com/1207795"},{"category":"external","summary":"SUSE Bug 1207822 for CVE-2023-0590","url":"https://bugzilla.suse.com/1207822"},{"category":"external","summary":"SUSE Bug 1211495 for CVE-2023-0590","url":"https://bugzilla.suse.com/1211495"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-0590","url":"https://bugzilla.suse.com/1211833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-0590"},{"cve":"CVE-2023-1118","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1118"}],"notes":[{"category":"general","text":"A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1118","url":"https://www.suse.com/security/cve/CVE-2023-1118"},{"category":"external","summary":"SUSE Bug 1208837 for CVE-2023-1118","url":"https://bugzilla.suse.com/1208837"},{"category":"external","summary":"SUSE Bug 1208910 for CVE-2023-1118","url":"https://bugzilla.suse.com/1208910"},{"category":"external","summary":"SUSE Bug 1210423 for CVE-2023-1118","url":"https://bugzilla.suse.com/1210423"},{"category":"external","summary":"SUSE Bug 1211495 for CVE-2023-1118","url":"https://bugzilla.suse.com/1211495"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-1118","url":"https://bugzilla.suse.com/1213841"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-1118","url":"https://bugzilla.suse.com/1213842"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-1118"},{"cve":"CVE-2023-1513","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1513"}],"notes":[{"category":"general","text":"A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1513","url":"https://www.suse.com/security/cve/CVE-2023-1513"},{"category":"external","summary":"SUSE Bug 1209532 for CVE-2023-1513","url":"https://bugzilla.suse.com/1209532"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"low"}],"title":"CVE-2023-1513"},{"cve":"CVE-2023-1670","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1670"}],"notes":[{"category":"general","text":"A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1670","url":"https://www.suse.com/security/cve/CVE-2023-1670"},{"category":"external","summary":"SUSE Bug 1209871 for CVE-2023-1670","url":"https://bugzilla.suse.com/1209871"},{"category":"external","summary":"SUSE Bug 1222212 for CVE-2023-1670","url":"https://bugzilla.suse.com/1222212"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"moderate"}],"title":"CVE-2023-1670"},{"cve":"CVE-2023-1989","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1989"}],"notes":[{"category":"general","text":"A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1989","url":"https://www.suse.com/security/cve/CVE-2023-1989"},{"category":"external","summary":"SUSE Bug 1210336 for CVE-2023-1989","url":"https://bugzilla.suse.com/1210336"},{"category":"external","summary":"SUSE Bug 1210500 for CVE-2023-1989","url":"https://bugzilla.suse.com/1210500"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-1989","url":"https://bugzilla.suse.com/1213841"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-1989","url":"https://bugzilla.suse.com/1213842"},{"category":"external","summary":"SUSE Bug 1214128 for CVE-2023-1989","url":"https://bugzilla.suse.com/1214128"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-1989"},{"cve":"CVE-2023-2162","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-2162"}],"notes":[{"category":"general","text":"A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-2162","url":"https://www.suse.com/security/cve/CVE-2023-2162"},{"category":"external","summary":"SUSE Bug 1210647 for CVE-2023-2162","url":"https://bugzilla.suse.com/1210647"},{"category":"external","summary":"SUSE Bug 1210662 for CVE-2023-2162","url":"https://bugzilla.suse.com/1210662"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-2162","url":"https://bugzilla.suse.com/1213841"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-2162","url":"https://bugzilla.suse.com/1213842"},{"category":"external","summary":"SUSE Bug 1214128 for CVE-2023-2162","url":"https://bugzilla.suse.com/1214128"},{"category":"external","summary":"SUSE Bug 1222212 for CVE-2023-2162","url":"https://bugzilla.suse.com/1222212"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-2162"},{"cve":"CVE-2023-23454","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23454"}],"notes":[{"category":"general","text":"cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23454","url":"https://www.suse.com/security/cve/CVE-2023-23454"},{"category":"external","summary":"SUSE Bug 1207036 for CVE-2023-23454","url":"https://bugzilla.suse.com/1207036"},{"category":"external","summary":"SUSE Bug 1207188 for CVE-2023-23454","url":"https://bugzilla.suse.com/1207188"},{"category":"external","summary":"SUSE Bug 1208030 for CVE-2023-23454","url":"https://bugzilla.suse.com/1208030"},{"category":"external","summary":"SUSE Bug 1208044 for CVE-2023-23454","url":"https://bugzilla.suse.com/1208044"},{"category":"external","summary":"SUSE Bug 1208085 for CVE-2023-23454","url":"https://bugzilla.suse.com/1208085"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-23454","url":"https://bugzilla.suse.com/1211833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-23454"},{"cve":"CVE-2023-23455","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23455"}],"notes":[{"category":"general","text":"atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23455","url":"https://www.suse.com/security/cve/CVE-2023-23455"},{"category":"external","summary":"SUSE Bug 1207036 for CVE-2023-23455","url":"https://bugzilla.suse.com/1207036"},{"category":"external","summary":"SUSE Bug 1207125 for CVE-2023-23455","url":"https://bugzilla.suse.com/1207125"},{"category":"external","summary":"SUSE Bug 1207189 for CVE-2023-23455","url":"https://bugzilla.suse.com/1207189"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-23455","url":"https://bugzilla.suse.com/1211833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"important"}],"title":"CVE-2023-23455"},{"cve":"CVE-2023-23559","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-23559"}],"notes":[{"category":"general","text":"In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-23559","url":"https://www.suse.com/security/cve/CVE-2023-23559"},{"category":"external","summary":"SUSE Bug 1207051 for CVE-2023-23559","url":"https://bugzilla.suse.com/1207051"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"moderate"}],"title":"CVE-2023-23559"},{"cve":"CVE-2023-28328","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28328"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28328","url":"https://www.suse.com/security/cve/CVE-2023-28328"},{"category":"external","summary":"SUSE Bug 1209291 for CVE-2023-28328","url":"https://bugzilla.suse.com/1209291"},{"category":"external","summary":"SUSE Bug 1222212 for CVE-2023-28328","url":"https://bugzilla.suse.com/1222212"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"moderate"}],"title":"CVE-2023-28328"},{"cve":"CVE-2023-32269","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-32269"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-32269","url":"https://www.suse.com/security/cve/CVE-2023-32269"},{"category":"external","summary":"SUSE Bug 1211186 for CVE-2023-32269","url":"https://bugzilla.suse.com/1211186"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.141.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.141.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:44Z","details":"moderate"}],"title":"CVE-2023-32269"}]}