{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\nThe SUSE Linux Enterprise 12 SP5 AZURE kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).\n- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).\n- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).\n- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).\n- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).\n- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).\n- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).\n- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).\n- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).\n- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).\n- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).\n- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).\n- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).\n- Documentation: Document sysfs interfaces purr, spurr, idle_purr, idle_spurr (PED-3947 bsc#1210544 ltc#202303).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (bsc#1211622).\n- Fix usrmerge error (boo#1211796)\n- IB/hfi1: Assign npages earlier (git-fixes)\n- IB/iser: bound protection_sg size by data_sg size (git-fixes)\n- IB/mlx4: Fix memory leaks (git-fixes)\n- IB/mlx4: Increase the timeout for CM cache (git-fixes)\n- IB/mlx5: Fix initializing CQ fragments buffer (git-fixes)\n- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)\n- IB/usnic: Fix potential deadlock (git-fixes)\n- KVM: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1 (git-fixes).\n- KVM: x86: Update the exit_qualification access bits while walking an address (git-fixes).\n- KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt->mode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: fix empty-body warnings (git-fixes).\n- KVM: x86: fix incorrect comparison in trace event (git-fixes).\n- KVM: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (git-fixes).\n- Move upstreamed media fixes into sorted section\n- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).\n- PCI: Call Max Payload Size-related fixup quirks early (git-fixes).\n- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).\n- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).\n- PCI: Return ~0 data on pciconfig_read() CAP_SYS_ADMIN failure (git-fixes).\n- PCI: aardvark: Configure PCIe resources from 'ranges' DT property (git-fixes).\n- PCI: aardvark: Fix PCIe Max Payload Size setting (git-fixes).\n- PCI: aardvark: Fix checking for PIO status (git-fixes).\n- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).\n- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).\n- PCI: xilinx-nwl: Enable the clock through CCF (git-fixes).\n- RDMA/bnxt_re: Restrict the max_gids to 256 (git-fixes)\n- RDMA/cma: Do not change route.addr.src_addr.ss_family (git-fixes)\n- RDMA/cma: Fix rdma_resolve_route() memory leak (git-fixes)\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/cxgb4: Fix missing error code in create_qp() (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hns: Bugfix for querying qkey (git-fixes)\n- RDMA/i40iw: Fix potential use after free (git-fixes)\n- RDMA/iw_cgxb4: Fix an error handling path in 'c4iw_connect()' (git-fixes)\n- RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (git-fixes)\n- RDMA/mlx5: Block delay drop to unprivileged users (git-fixes)\n- RDMA/rxe: Fix error type of mmap_offset (git-fixes)\n- RDMA/srp: Move large values to a new enum for gcc13 (git-fixes)\n- RDMA/srp: Propagate ib_post_send() failures to the SCSI mid-layer (git-fixes)\n- RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)\n- RDMa/mthca: Work around -Wenum-conversion warning (git-fixes)\n- RDS: IB: Fix null pointer issue (git-fixes).\n- USB: core: Add routines for endpoint checks in old drivers (git-fixes).\n- USB: sisusbvga: Add endpoint checks (git-fixes).\n- Update patch reference for libata fix (bsc#1118212).\n- adm8211: fix error return code in adm8211_probe() (git-fixes).\n- backlight: lm3630a: Fix return code of .update_status() callback (bsc#1129770)\n- blacklist.conf: workqueue: Cosmetic change. Not worth backporting (bsc#1211275)\n- bonding: show full hw address in sysfs for slave entries (git-fixes).\n- ceph: force updating the msg pointer in non-split case (bsc#1211801).\n- cpuidle/powernv: avoid double irq enable coming out of idle (PED-3947 bsc#1210544 ltc#202303).\n- cpuidle: powerpc: cpuidle set polling before enabling irqs (PED-3947 bsc#1210544 ltc#202303).\n- cpuidle: powerpc: no memory barrier after break from idle (PED-3947 bsc#1210544 ltc#202303).\n- cpuidle: powerpc: read mostly for common globals (PED-3947 bsc#1210544 ltc#202303).\n- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).\n- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).\n- fbcon: Check font dimension limits (bsc#1154048)\n- fbdev: uvesafb: Fixes an error handling path in uvesafb_probe() (bsc#1154048)\n- fix kcm_clone() (git-fixes).\n- fotg210-udc: Add missing completion handler (git-fixes).\n- ip6_tunnel: allow ip6gre dev mtu to be set below 1280 (git-fixes).\n- ip6_tunnel: fix IFLA_MTU ignored on NEWLINK (git-fixes).\n- ipoib: correcly show a VF hardware address (git-fixes)\n- ipv4: ipv4_default_advmss() should use route mtu (git-fixes).\n- ipv6: Reinject IPv6 packets if IPsec policy matches after SNAT (git-fixes).\n- ipv6: icmp6: Allow icmp messages to be looped back (git-fixes).\n- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).\n- kcm: Check if sk_user_data already set in kcm_attach (git-fixes).\n- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)\n- kernel-source: Remove unused macro variant_symbols\n- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731).\n- kvm: mmu: Do not read PDPTEs when paging is not enabled (git-fixes).\n- l2tp: remove configurable payload offset (git-fixes).\n- l2tp: remove l2specific_len dependency in l2tp_core (git-fixes).\n- libata: add horkage for ASMedia 1092 (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: drop multicast fragments (git-fixes).\n- mac80211: fix fast-rx encryption check (git-fixes).\n- mac80211: pause TX while changing interface type (git-fixes).\n- media: radio-shark: Add endpoint checks (git-fixes).\n- mlx4: Use snprintf instead of complicated strcpy (git-fixes)\n- mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes).\n- net/iucv: Fix size of interrupt data (bsc#1211466).\n- net/mlx4_core: Fix return codes of unsupported operations (git-fixes).\n- net/tcp/illinois: replace broken algorithm reference link (git-fixes).\n- net: Extra '_get' in declaration of arch_get_platform_mac_address (git-fixes).\n- net: altera_tse: fix connect_local_phy error path (git-fixes).\n- net: altera_tse: fix msgdma_tx_completion on non-zero fill_level case (git-fixes).\n- net: amd: add missing of_node_put() (git-fixes).\n- net: arc_emac: fix arc_emac_rx() error paths (git-fixes).\n- net: broadcom: fix return type of ndo_start_xmit function (git-fixes).\n- net: davinci_emac: match the mdio device against its compatible if possible (git-fixes).\n- net: dsa: b53: Add BCM5389 support (git-fixes).\n- net: dsa: bcm_sf2: Turn on PHY to allow successful registration (git-fixes).\n- net: dsa: mt7530: fix module autoloading for OF platform drivers (git-fixes).\n- net: dsa: qca8k: Add support for QCA8334 switch (git-fixes).\n- net: emac: fix fixed-link setup for the RTL8363SB switch (git-fixes).\n- net: ethernet: ti: cpsw-phy-sel: check bus_find_device() ret value (git-fixes).\n- net: faraday: fix return type of ndo_start_xmit function (git-fixes).\n- net: hisilicon: remove unexpected free_netdev (git-fixes).\n- net: hns3: fix return type of ndo_start_xmit function (git-fixes).\n- net: hns: Fix wrong read accesses via Clause 45 MDIO protocol (git-fixes).\n- net: ibm: fix possible object reference leak (git-fixes).\n- net: ipv6: send NS for DAD when link operationally up (git-fixes).\n- net: mediatek: setup proper state for disabled GMAC on the default (git-fixes).\n- net: micrel: fix return type of ndo_start_xmit function (git-fixes).\n- net: mvneta: fix enable of all initialized RXQs (git-fixes).\n- net: netxen: fix a missing check and an uninitialized use (git-fixes).\n- net: propagate dev_get_valid_name return code (git-fixes).\n- net: qca_spi: Fix log level if probe fails (git-fixes).\n- net: qcom/emac: Use proper free methods during TX (git-fixes).\n- net: qla3xxx: Remove overflowing shift statement (git-fixes).\n- net: smsc: fix return type of ndo_start_xmit function (git-fixes).\n- net: stmmac: do not log oversized frames (git-fixes).\n- net: stmmac: fix dropping of multi-descriptor RX frames (git-fixes).\n- net: sun: fix return type of ndo_start_xmit function (git-fixes).\n- net: toshiba: fix return type of ndo_start_xmit function (git-fixes).\n- net: xfrm: allow clearing socket xfrm policies (git-fixes).\n- net: xilinx: fix return type of ndo_start_xmit function (git-fixes).\n- netfilter: ebtables: convert BUG_ONs to WARN_ONs (git-fixes).\n- netfilter: ipt_CLUSTERIP: put config instead of freeing it (git-fixes).\n- netfilter: ipt_CLUSTERIP: put config struct if we can't increment ct refcount (git-fixes).\n- nvme-pci: avoid the deepest sleep state on Kingston A2000 SSDs (git-fixes).\n- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).\n- nvme-pci: unquiesce admin queue on shutdown (git-fixes).\n- nvme-pci: use the same attributes when freeing host_mem_desc_bufs (git-fixes).\n- nvme: Fix u32 overflow in the number of namespace list calculation (git-fixes).\n- nvme: free sq/cq dbbuf pointers when dbbuf set fails (git-fixes).\n- nvme: refine the Qemu Identify CNS quirk (git-fixes).\n- nvme: remove the ifdef around nvme_nvm_ioctl (git-fixes).\n- platform/x86: alienware-wmi: Adjust instance of wmi_evaluate_method calls to 0 (git-fixes).\n- platform/x86: alienware-wmi: constify attribute_group structures (git-fixes).\n- platform/x86: alienware-wmi: fix format string overflow warning (git-fixes).\n- platform/x86: alienware-wmi: fix kfree on potentially uninitialized pointer (git-fixes).\n- platform/x86: dell-laptop: fix rfkill functionality.\n- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).\n- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).\n- powerpc/idle: Store PURR snapshot in a per-cpu global variable (PED-3947 bsc#1210544 ltc#202303).\n- powerpc/pseries: Account for SPURR ticks on idle CPUs (PED-3947 bsc#1210544 ltc#202303).\n- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).\n- powerpc/sysfs: Show idle_purr and idle_spurr for every CPU (PED-3947 bsc#1210544 ltc#202303).\n- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).\n- powerpc: Move idle_loop_prolog()/epilog() functions to header file (PED-3947 bsc#1210544 ltc#202303).\n- powerpc: Squash lines for simple wrapper functions (bsc#1065729).\n- rds; Reset rs->rs_bound_addr in rds_add_bound() failure path (git-fixes).\n- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).\n- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).\n- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB\n- rpm/kernel-binary.spec.in: Fix missing kernel-preempt-devel and KMP Provides (bsc#1199046)\n- rxe: IB_WR_REG_MR does not capture MR's iova field (git-fixes)\n- s390/dasd: correct numa_node in dasd_alloc_queue (git-fixes bsc#1211362).\n- s390/extmem: fix gcc 8 stringop-overflow warning (git-fixes bsc#1211363).\n- s390/kasan: fix early pgm check handler execution (git-fixes bsc#1211360).\n- s390/pci: fix sleeping in atomic during hotplug (git-fixes bsc#1211364).\n- s390/scm_blk: correct numa_node in scm_blk_dev_setup (git-fixes bsc#1211365).\n- s390/sysinfo: add missing #ifdef CONFIG_PROC_FS (git-fixes bsc#1211366).\n- s390/uaccess: add missing earlyclobber annotations to __clear_user() (LTC#202116 bsc#1209857 git-fixes).\n- s390: ctcm: fix ctcm_new_device error return code (git-fixes bsc#1211361).\n- scsi: qla2xxx: Declare SCSI host template const (bsc#1211960).\n- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).\n- scsi: qla2xxx: Fix hang in task management (bsc#1211960).\n- scsi: qla2xxx: Fix hang in task management (bsc#1211960).\n- scsi: qla2xxx: Fix mem access after free (bsc#1211960).\n- scsi: qla2xxx: Fix mem access after free (bsc#1211960).\n- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).\n- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).\n- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).\n- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).\n- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).\n- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).\n- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).\n- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).\n- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).\n- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).\n- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).\n- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).\n- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).\n- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).\n- scsi: storvsc: Parameterize number hardware queues (bsc#1211622).\n- sctp: avoid flushing unsent queue when doing asoc reset (git-fixes).\n- sctp: fix erroneous inc of snmp SctpFragUsrMsgs (git-fixes).\n- sctp: fix the issue that a __u16 variable may overflow in sctp_ulpq_renege (git-fixes).\n- sctp: make use of pre-calculated len (git-fixes).\n- seccomp: Set PF_SUPERPRIV when checking capability (git-fixes bsc#1211816).\n- sfc: suppress duplicate nvmem partition types in efx_ef10_mtd_probe (git-fixes).\n- sit: fix IFLA_MTU ignored on NEWLINK (git-fixes).\n- stmmac: fix valid numbers of unicast filter entries (git-fixes).\n- sunvnet: does not support GSO for sctp (git-fixes).\n- usb: dwc3: Fix race between dwc3_set_mode and __dwc3_set_mode (git-fixes).\n- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).\n- usrmerge: Compatibility with earlier rpm (boo#1211796)\n- usrmerge: Remove usrmerge compatibility symlink in buildroot (boo#1211796).\n- vrf: mark skb for multicast or link-local as enslaved to VRF (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).\n- wcn36xx: Add ieee80211 rx status rate information (git-fixes).\n- wcn36xx: Channel list update before hardware scan (git-fixes).\n- wcn36xx: Disable bmps when encryption is disabled (git-fixes).\n- wcn36xx: Ensure finish scan is not requested before start scan (git-fixes).\n- wcn36xx: Fix TX data path (git-fixes).\n- wcn36xx: Fix multiple AMPDU sessions support (git-fixes).\n- wcn36xx: Fix software-driven scan (git-fix).\n- wcn36xx: Fix warning due to bad rate_idx (git-fixes).\n- wcn36xx: Increase number of TX retries (git-fixes).\n- wcn36xx: Specify ieee80211_rx_status.nss (git-fixes).\n- wcn36xx: Use kmemdup instead of duplicating it in wcn36xx_smd_process_ptt_msg_rsp (git-fixes).\n- wcn36xx: Use sequence number allocated by mac80211 (git-fixes).\n- wcn36xx: disable HW_CONNECTION_MONITOR (git-fixes).\n- wcn36xx: ensure pairing of init_scan/finish_scan and start_scan/end_scan (git-fixes).\n- wcn36xx: fix spelling mistake 'to' -> 'too' (git-fixes).\n- wcn36xx: fix typo (git-fixes).\n- wcn36xx: remove unecessary return (git-fixes).\n- wcn36xx: use dma_zalloc_coherent instead of allocator/memset (git-fixes).\n- workqueue: Fix hung time report of worker pools (bsc#1211044).\n- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).\n- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).\n- workqueue: Warn when a new worker could not be created (bsc#1211044).\n- workqueue: Warn when a rescuer could not be created (bsc#1211044).\n- x86/kvm/vmx: fix old-style function declaration (git-fixes).\n- x86/kvm: Do not call kvm_spurious_fault() from .fixup (git-fixes).\n- x86: kvm: avoid constant-conversion warning (git-fixes).\n- xen/netback: do not do grant copy across page boundary (git-fixes).\n- xen/netback: use same error messages for same errors (git-fixes).\n- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (git-fixes).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2023-2507,SUSE-SLE-SERVER-12-SP5-2023-2507","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2507-1.json"},{"category":"self","summary":"URL for SUSE-SU-2023:2507-1","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20232507-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2023:2507-1","url":"https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html"},{"category":"self","summary":"SUSE Bug 1065729","url":"https://bugzilla.suse.com/1065729"},{"category":"self","summary":"SUSE Bug 1118212","url":"https://bugzilla.suse.com/1118212"},{"category":"self","summary":"SUSE Bug 1129770","url":"https://bugzilla.suse.com/1129770"},{"category":"self","summary":"SUSE Bug 1154048","url":"https://bugzilla.suse.com/1154048"},{"category":"self","summary":"SUSE Bug 1172073","url":"https://bugzilla.suse.com/1172073"},{"category":"self","summary":"SUSE Bug 1191731","url":"https://bugzilla.suse.com/1191731"},{"category":"self","summary":"SUSE Bug 1199046","url":"https://bugzilla.suse.com/1199046"},{"category":"self","summary":"SUSE Bug 1204405","url":"https://bugzilla.suse.com/1204405"},{"category":"self","summary":"SUSE Bug 1205756","url":"https://bugzilla.suse.com/1205756"},{"category":"self","summary":"SUSE Bug 1205758","url":"https://bugzilla.suse.com/1205758"},{"category":"self","summary":"SUSE Bug 1205760","url":"https://bugzilla.suse.com/1205760"},{"category":"self","summary":"SUSE Bug 1205762","url":"https://bugzilla.suse.com/1205762"},{"category":"self","summary":"SUSE Bug 1205803","url":"https://bugzilla.suse.com/1205803"},{"category":"self","summary":"SUSE Bug 1206878","url":"https://bugzilla.suse.com/1206878"},{"category":"self","summary":"SUSE Bug 1209287","url":"https://bugzilla.suse.com/1209287"},{"category":"self","summary":"SUSE Bug 1209366","url":"https://bugzilla.suse.com/1209366"},{"category":"self","summary":"SUSE Bug 1209857","url":"https://bugzilla.suse.com/1209857"},{"category":"self","summary":"SUSE Bug 1210544","url":"https://bugzilla.suse.com/1210544"},{"category":"self","summary":"SUSE Bug 1210629","url":"https://bugzilla.suse.com/1210629"},{"category":"self","summary":"SUSE Bug 1210715","url":"https://bugzilla.suse.com/1210715"},{"category":"self","summary":"SUSE Bug 1210783","url":"https://bugzilla.suse.com/1210783"},{"category":"self","summary":"SUSE Bug 1210791","url":"https://bugzilla.suse.com/1210791"},{"category":"self","summary":"SUSE Bug 1210806","url":"https://bugzilla.suse.com/1210806"},{"category":"self","summary":"SUSE Bug 1210940","url":"https://bugzilla.suse.com/1210940"},{"category":"self","summary":"SUSE Bug 1211044","url":"https://bugzilla.suse.com/1211044"},{"category":"self","summary":"SUSE Bug 1211089","url":"https://bugzilla.suse.com/1211089"},{"category":"self","summary":"SUSE Bug 1211105","url":"https://bugzilla.suse.com/1211105"},{"category":"self","summary":"SUSE Bug 1211186","url":"https://bugzilla.suse.com/1211186"},{"category":"self","summary":"SUSE Bug 1211275","url":"https://bugzilla.suse.com/1211275"},{"category":"self","summary":"SUSE Bug 1211360","url":"https://bugzilla.suse.com/1211360"},{"category":"self","summary":"SUSE Bug 1211361","url":"https://bugzilla.suse.com/1211361"},{"category":"self","summary":"SUSE Bug 1211362","url":"https://bugzilla.suse.com/1211362"},{"category":"self","summary":"SUSE Bug 1211363","url":"https://bugzilla.suse.com/1211363"},{"category":"self","summary":"SUSE Bug 1211364","url":"https://bugzilla.suse.com/1211364"},{"category":"self","summary":"SUSE Bug 1211365","url":"https://bugzilla.suse.com/1211365"},{"category":"self","summary":"SUSE Bug 1211366","url":"https://bugzilla.suse.com/1211366"},{"category":"self","summary":"SUSE Bug 1211466","url":"https://bugzilla.suse.com/1211466"},{"category":"self","summary":"SUSE Bug 1211592","url":"https://bugzilla.suse.com/1211592"},{"category":"self","summary":"SUSE Bug 1211622","url":"https://bugzilla.suse.com/1211622"},{"category":"self","summary":"SUSE Bug 1211796","url":"https://bugzilla.suse.com/1211796"},{"category":"self","summary":"SUSE Bug 1211801","url":"https://bugzilla.suse.com/1211801"},{"category":"self","summary":"SUSE Bug 1211816","url":"https://bugzilla.suse.com/1211816"},{"category":"self","summary":"SUSE Bug 1211960","url":"https://bugzilla.suse.com/1211960"},{"category":"self","summary":"SUSE CVE CVE-2022-3566 page","url":"https://www.suse.com/security/cve/CVE-2022-3566/"},{"category":"self","summary":"SUSE CVE CVE-2022-45884 page","url":"https://www.suse.com/security/cve/CVE-2022-45884/"},{"category":"self","summary":"SUSE CVE CVE-2022-45885 page","url":"https://www.suse.com/security/cve/CVE-2022-45885/"},{"category":"self","summary":"SUSE CVE CVE-2022-45886 page","url":"https://www.suse.com/security/cve/CVE-2022-45886/"},{"category":"self","summary":"SUSE CVE CVE-2022-45887 page","url":"https://www.suse.com/security/cve/CVE-2022-45887/"},{"category":"self","summary":"SUSE CVE CVE-2022-45919 page","url":"https://www.suse.com/security/cve/CVE-2022-45919/"},{"category":"self","summary":"SUSE CVE CVE-2023-1380 page","url":"https://www.suse.com/security/cve/CVE-2023-1380/"},{"category":"self","summary":"SUSE CVE CVE-2023-2176 page","url":"https://www.suse.com/security/cve/CVE-2023-2176/"},{"category":"self","summary":"SUSE CVE CVE-2023-2194 page","url":"https://www.suse.com/security/cve/CVE-2023-2194/"},{"category":"self","summary":"SUSE CVE CVE-2023-2269 page","url":"https://www.suse.com/security/cve/CVE-2023-2269/"},{"category":"self","summary":"SUSE CVE CVE-2023-2513 page","url":"https://www.suse.com/security/cve/CVE-2023-2513/"},{"category":"self","summary":"SUSE CVE CVE-2023-28466 page","url":"https://www.suse.com/security/cve/CVE-2023-28466/"},{"category":"self","summary":"SUSE CVE CVE-2023-31084 page","url":"https://www.suse.com/security/cve/CVE-2023-31084/"},{"category":"self","summary":"SUSE CVE CVE-2023-31436 page","url":"https://www.suse.com/security/cve/CVE-2023-31436/"},{"category":"self","summary":"SUSE CVE CVE-2023-32269 page","url":"https://www.suse.com/security/cve/CVE-2023-32269/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2023-06-14T07:24:56Z","generator":{"date":"2023-06-14T07:24:56Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2023:2507-1","initial_release_date":"2023-06-14T07:24:56Z","revision_history":[{"date":"2023-06-14T07:24:56Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-devel-azure-4.12.14-16.136.1.noarch","product":{"name":"kernel-devel-azure-4.12.14-16.136.1.noarch","product_id":"kernel-devel-azure-4.12.14-16.136.1.noarch"}},{"category":"product_version","name":"kernel-source-azure-4.12.14-16.136.1.noarch","product":{"name":"kernel-source-azure-4.12.14-16.136.1.noarch","product_id":"kernel-source-azure-4.12.14-16.136.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-azure-4.12.14-16.136.1.x86_64","product":{"name":"cluster-md-kmp-azure-4.12.14-16.136.1.x86_64","product_id":"cluster-md-kmp-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-azure-4.12.14-16.136.1.x86_64","product":{"name":"dlm-kmp-azure-4.12.14-16.136.1.x86_64","product_id":"dlm-kmp-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-azure-4.12.14-16.136.1.x86_64","product":{"name":"gfs2-kmp-azure-4.12.14-16.136.1.x86_64","product_id":"gfs2-kmp-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-azure-4.12.14-16.136.1.x86_64","product":{"name":"kernel-azure-4.12.14-16.136.1.x86_64","product_id":"kernel-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-azure-base-4.12.14-16.136.1.x86_64","product":{"name":"kernel-azure-base-4.12.14-16.136.1.x86_64","product_id":"kernel-azure-base-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-azure-devel-4.12.14-16.136.1.x86_64","product":{"name":"kernel-azure-devel-4.12.14-16.136.1.x86_64","product_id":"kernel-azure-devel-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-azure-extra-4.12.14-16.136.1.x86_64","product":{"name":"kernel-azure-extra-4.12.14-16.136.1.x86_64","product_id":"kernel-azure-extra-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-azure-kgraft-devel-4.12.14-16.136.1.x86_64","product":{"name":"kernel-azure-kgraft-devel-4.12.14-16.136.1.x86_64","product_id":"kernel-azure-kgraft-devel-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kernel-syms-azure-4.12.14-16.136.1.x86_64","product":{"name":"kernel-syms-azure-4.12.14-16.136.1.x86_64","product_id":"kernel-syms-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-azure-4.12.14-16.136.1.x86_64","product":{"name":"kselftests-kmp-azure-4.12.14-16.136.1.x86_64","product_id":"kselftests-kmp-azure-4.12.14-16.136.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-azure-4.12.14-16.136.1.x86_64","product":{"name":"ocfs2-kmp-azure-4.12.14-16.136.1.x86_64","product_id":"ocfs2-kmp-azure-4.12.14-16.136.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp5"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-azure-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-azure-base-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-base-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-azure-devel-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-devel-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-azure-4.12.14-16.136.1.noarch as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch"},"product_reference":"kernel-devel-azure-4.12.14-16.136.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-azure-4.12.14-16.136.1.noarch as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch"},"product_reference":"kernel-source-azure-4.12.14-16.136.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-azure-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-syms-azure-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-azure-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-azure-base-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-base-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-azure-devel-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-azure-devel-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-azure-4.12.14-16.136.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch"},"product_reference":"kernel-devel-azure-4.12.14-16.136.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-azure-4.12.14-16.136.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch"},"product_reference":"kernel-source-azure-4.12.14-16.136.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-azure-4.12.14-16.136.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"},"product_reference":"kernel-syms-azure-4.12.14-16.136.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"}]},"vulnerabilities":[{"cve":"CVE-2022-3566","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-3566"}],"notes":[{"category":"general","text":"A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-3566","url":"https://www.suse.com/security/cve/CVE-2022-3566"},{"category":"external","summary":"SUSE Bug 1204405 for CVE-2022-3566","url":"https://bugzilla.suse.com/1204405"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2022-3566"},{"cve":"CVE-2022-45884","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-45884"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-45884","url":"https://www.suse.com/security/cve/CVE-2022-45884"},{"category":"external","summary":"SUSE Bug 1205756 for CVE-2022-45884","url":"https://bugzilla.suse.com/1205756"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2022-45884"},{"cve":"CVE-2022-45885","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-45885"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-45885","url":"https://www.suse.com/security/cve/CVE-2022-45885"},{"category":"external","summary":"SUSE Bug 1205758 for CVE-2022-45885","url":"https://bugzilla.suse.com/1205758"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2022-45885"},{"cve":"CVE-2022-45886","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-45886"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-45886","url":"https://www.suse.com/security/cve/CVE-2022-45886"},{"category":"external","summary":"SUSE Bug 1205760 for CVE-2022-45886","url":"https://bugzilla.suse.com/1205760"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2022-45886"},{"cve":"CVE-2022-45887","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-45887"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-45887","url":"https://www.suse.com/security/cve/CVE-2022-45887"},{"category":"external","summary":"SUSE Bug 1205762 for CVE-2022-45887","url":"https://bugzilla.suse.com/1205762"},{"category":"external","summary":"SUSE Bug 1220015 for CVE-2022-45887","url":"https://bugzilla.suse.com/1220015"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2022-45887"},{"cve":"CVE-2022-45919","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-45919"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-45919","url":"https://www.suse.com/security/cve/CVE-2022-45919"},{"category":"external","summary":"SUSE Bug 1205803 for CVE-2022-45919","url":"https://bugzilla.suse.com/1205803"},{"category":"external","summary":"SUSE Bug 1208600 for CVE-2022-45919","url":"https://bugzilla.suse.com/1208600"},{"category":"external","summary":"SUSE Bug 1208912 for CVE-2022-45919","url":"https://bugzilla.suse.com/1208912"},{"category":"external","summary":"SUSE Bug 1214128 for CVE-2022-45919","url":"https://bugzilla.suse.com/1214128"},{"category":"external","summary":"SUSE Bug 1215674 for CVE-2022-45919","url":"https://bugzilla.suse.com/1215674"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"important"}],"title":"CVE-2022-45919"},{"cve":"CVE-2023-1380","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1380"}],"notes":[{"category":"general","text":"A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1380","url":"https://www.suse.com/security/cve/CVE-2023-1380"},{"category":"external","summary":"SUSE Bug 1209287 for CVE-2023-1380","url":"https://bugzilla.suse.com/1209287"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-1380"},{"cve":"CVE-2023-2176","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-2176"}],"notes":[{"category":"general","text":"A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-2176","url":"https://www.suse.com/security/cve/CVE-2023-2176"},{"category":"external","summary":"SUSE Bug 1210629 for CVE-2023-2176","url":"https://bugzilla.suse.com/1210629"},{"category":"external","summary":"SUSE Bug 1210630 for CVE-2023-2176","url":"https://bugzilla.suse.com/1210630"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-2176","url":"https://bugzilla.suse.com/1213842"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"important"}],"title":"CVE-2023-2176"},{"cve":"CVE-2023-2194","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-2194"}],"notes":[{"category":"general","text":"An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-2194","url":"https://www.suse.com/security/cve/CVE-2023-2194"},{"category":"external","summary":"SUSE Bug 1210715 for CVE-2023-2194","url":"https://bugzilla.suse.com/1210715"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-2194"},{"cve":"CVE-2023-2269","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-2269"}],"notes":[{"category":"general","text":"A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-2269","url":"https://www.suse.com/security/cve/CVE-2023-2269"},{"category":"external","summary":"SUSE Bug 1210806 for CVE-2023-2269","url":"https://bugzilla.suse.com/1210806"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-2269"},{"cve":"CVE-2023-2513","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-2513"}],"notes":[{"category":"general","text":"A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-2513","url":"https://www.suse.com/security/cve/CVE-2023-2513"},{"category":"external","summary":"SUSE Bug 1211105 for CVE-2023-2513","url":"https://bugzilla.suse.com/1211105"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-2513"},{"cve":"CVE-2023-28466","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-28466"}],"notes":[{"category":"general","text":"do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-28466","url":"https://www.suse.com/security/cve/CVE-2023-28466"},{"category":"external","summary":"SUSE Bug 1209366 for CVE-2023-28466","url":"https://bugzilla.suse.com/1209366"},{"category":"external","summary":"SUSE Bug 1210452 for CVE-2023-28466","url":"https://bugzilla.suse.com/1210452"},{"category":"external","summary":"SUSE Bug 1211833 for CVE-2023-28466","url":"https://bugzilla.suse.com/1211833"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-28466","url":"https://bugzilla.suse.com/1213841"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"important"}],"title":"CVE-2023-28466"},{"cve":"CVE-2023-31084","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-31084"}],"notes":[{"category":"general","text":"An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-31084","url":"https://www.suse.com/security/cve/CVE-2023-31084"},{"category":"external","summary":"SUSE Bug 1210783 for CVE-2023-31084","url":"https://bugzilla.suse.com/1210783"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-31084"},{"cve":"CVE-2023-31436","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-31436"}],"notes":[{"category":"general","text":"qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-31436","url":"https://www.suse.com/security/cve/CVE-2023-31436"},{"category":"external","summary":"SUSE Bug 1210940 for CVE-2023-31436","url":"https://bugzilla.suse.com/1210940"},{"category":"external","summary":"SUSE Bug 1211260 for CVE-2023-31436","url":"https://bugzilla.suse.com/1211260"},{"category":"external","summary":"SUSE Bug 1213841 for CVE-2023-31436","url":"https://bugzilla.suse.com/1213841"},{"category":"external","summary":"SUSE Bug 1213842 for CVE-2023-31436","url":"https://bugzilla.suse.com/1213842"},{"category":"external","summary":"SUSE Bug 1214128 for CVE-2023-31436","url":"https://bugzilla.suse.com/1214128"},{"category":"external","summary":"SUSE Bug 1223091 for CVE-2023-31436","url":"https://bugzilla.suse.com/1223091"},{"category":"external","summary":"SUSE Bug 1224419 for CVE-2023-31436","url":"https://bugzilla.suse.com/1224419"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"important"}],"title":"CVE-2023-31436"},{"cve":"CVE-2023-32269","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-32269"}],"notes":[{"category":"general","text":"An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-32269","url":"https://www.suse.com/security/cve/CVE-2023-32269"},{"category":"external","summary":"SUSE Bug 1211186 for CVE-2023-32269","url":"https://bugzilla.suse.com/1211186"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.136.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.136.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.136.1.x86_64"]}],"threats":[{"category":"impact","date":"2023-06-14T07:24:56Z","details":"moderate"}],"title":"CVE-2023-32269"}]}