SUSE-SU-2023:4058-1

Vulnerability from csaf_suse - Published: 2023-10-12 08:00 - Updated: 2023-10-12 08:00
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858). - CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860). - CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861). - CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467). - CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351). - CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation (bsc#1215899). - CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150). - CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703). - CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275). - CVE-2023-37453: Fixed oversight in SuperSpeed initialization (bsc#1213123). - CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117). - CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115). - CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (bsc#1214022). - CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169). - CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221). - CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643). - CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233). - CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995). The following non-security bugs were fixed: - ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes). - ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes). - ARM: pxa: remove use of symbol_get() (git-fixes). - ASoC: SOF: core: Only call sof_ops_free() on remove if the probe was successful (git-fixes). - ASoC: amd: yc: Fix non-functional mic on Lenovo 82QF and 82UG (git-fixes). - ASoC: hdaudio.c: Add missing check for devm_kstrdup (git-fixes). - ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes). - ASoC: meson: spdifin: start hw on dai probe (git-fixes). - ASoC: rt5640: Fix IRQ not being free-ed for HDA jack detect mode (git-fixes). - ASoC: rt5640: Fix sleep in atomic context (git-fixes). - ASoC: rt5640: Revert 'Fix sleep in atomic context' (git-fixes). - ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes). - ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes). - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes). - Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor (bsc#1206453). - Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM (bsc#1206453). - Drivers: hv: vmbus: Support fully enlightened TDX guests (bsc#1206453). - Drop amdgpu patch causing spamming (bsc#1215523). - Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes). - KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes). - KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes). - KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911). - KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915). - KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896). - KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916). - KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894). - KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895). - KVM: x86/mmu: Include mmu.h in spte.h (git-fixes). - KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes). - NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes). - NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes). - NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes). - NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes). - NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes). - NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes). - NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes). - NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes). - PCI: Free released resource after coalescing (git-fixes). - RDMA/siw: Fabricate a GID on tun and loopback devices (git-fixes) - Revert 'PCI: Mark NVIDIA T4 GPUs to avoid bus reset' (git-fixes). - Revert 'scsi: qla2xxx: Fix buffer overrun' (bsc#1214928). - SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes). - USB: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes). - USB: serial: option: add Quectel EM05G variant (0x030e) (git-fixes). - arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes) - arm64/hyperv: Use CPUHP_AP_HYPERV_ONLINE state to fix CPU online sequencing (bsc#1206453). - arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes). - arm64: module-plts: inline linux/moduleloader.h (git-fixes) - arm64: module: Use module_init_layout_section() to spot init sections (git-fixes) - arm64: sdei: abort running SDEI handlers during crash (git-fixes) - arm64: tegra: Update AHUB clock parent and rate (git-fixes) - ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes). - ata: pata_falcon: fix IO base selection for Q40 (git-fixes). - ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes). - ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes). - backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes). - blacklist.conf: workqueue: compiler warning on 32-bit systems with Clang (bsc#1215877) - blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986). - blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992). - block/mq-deadline: use correct way to throttling write requests (bsc#1214993). - bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322). - bpf: Clear the probe_addr for uprobe (git-fixes). - btrfs: do not hold CPU for too long when defragging a file (bsc#1214988). - clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest (bsc#1206453). - drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest (bsc#1206453). - drm/amd/display: Add smu write msg id fail retry process (git-fixes). - drm/amd/display: Remove wait while locked (git-fixes). - drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma (git-fixes). - drm/amd/display: fix the white screen issue when >= 64GB DRAM (git-fixes). - drm/amd/display: prevent potential division by zero errors (git-fixes). - drm/amd/display: register edp_backlight_control() for DCN301 (git-fixes). - drm/ast: Add BMC virtual connector (bsc#1152472) Backporting changes: * rename ast_device to ast_private - drm/ast: report connection status on Display Port. (bsc#1152472) Backporting changes: * rename ast_device to ast_private * context changes - drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808). - drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes). - drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() (git-fixes). - drm/i915/gvt: Verify pfn is 'valid' before dereferencing 'struct page' (git-fixes). - drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes). - drm/meson: fix memory leak on ->hpd_notify callback (git-fixes). - drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes). - drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes). - drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes). - ext4: Remove ext4 locking of moved directory (bsc#1214957). - ext4: avoid potential data overflow in next_linear_group (bsc#1214951). - ext4: correct inline offset when handling xattrs in inode body (bsc#1214950). - ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). - ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943). - ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944). - ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942). - ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941). - ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940). - fs: Establish locking order for unrelated directories (bsc#1214958). - fs: Lock moved directories (bsc#1214959). - fs: do not update freeing inode i_io_list (bsc#1214813). - fs: lockd: avoid possible wrong NULL parameter (git-fixes). - fs: no need to check source (bsc#1215752). - fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813). - fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581). - gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479). - gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). - gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). - gve: Changes to add new TX queues (bsc#1214479). - gve: Control path for DQO-QPL (bsc#1214479). - gve: Fix gve interrupt names (bsc#1214479). - gve: RX path for DQO-QPL (bsc#1214479). - gve: Tx path for DQO-QPL (bsc#1214479). - gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). - gve: XDP support GQI-QPL: helper function changes (bsc#1214479). - gve: fix frag_list chaining (bsc#1214479). - gve: trivial spell fix Recive to Receive (bsc#1214479). - gve: use vmalloc_array and vcalloc (bsc#1214479). - hwrng: virtio - Fix race on data_avail and actual data (git-fixes). - hwrng: virtio - add an internal buffer (git-fixes). - hwrng: virtio - always add a pending request (git-fixes). - hwrng: virtio - do not wait on cleanup (git-fixes). - hwrng: virtio - do not waste entropy (git-fixes). - i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes). - i3c: master: svc: fix probe failure when no i3c device exist (git-fixes). - i915/pmu: Move execlist stats initialization to execlist specific setup (git-fixes). - idr: fix param name in idr_alloc_cyclic() doc (git-fixes). - iommu/virtio: Detach domain on endpoint release (git-fixes). - iommu/virtio: Return size mapped for a detached domain (git-fixes). - jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948). - jbd2: check 'jh->b_transaction' before removing it from checkpoint (bsc#1214953). - jbd2: correct the end of the journal recovery scan range (bsc#1214955). - jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949). - jbd2: fix checkpoint cleanup performance regression (bsc#1214952). - jbd2: recheck chechpointing non-dirty buffer (bsc#1214945). - jbd2: remove journal_clean_one_cp_list() (bsc#1214947). - jbd2: remove t_checkpoint_io_list (bsc#1214946). - jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946). - kabi/severities: ignore mlx4 internal symbols - s390/ipl: add support for List-Directed dump from ECKD DASD (jsc#PED-2023, jsc#PED-2025). - kconfig: fix possible buffer overflow (git-fixes). - kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template. - kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist. - kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes). - loop: Fix use-after-free issues (bsc#1214991). - loop: loop_set_status_from_info() check before assignment (bsc#1214990). - mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236). - mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236). - mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236). - mlx4: Delete custom device management logic (bsc#1187236). - mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236). - mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236). - mlx4: Move the bond work to the core driver (bsc#1187236). - mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236). - mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236). - mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236). - mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236). - module: Expose module_init_layout_section() (git-fixes) - net/mlx4: Remove many unnecessary NULL values (bsc#1187236). - net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes). - net: mana: Add page pool for RX buffers (bsc#1214040). - net: mana: Configure hwc timeout from hardware (bsc#1214037). - net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes). - net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes). - nfs/blocklayout: Use the passed in gfp flags (git-fixes). - nfsd: Fix race to FREE_STATEID and cl_revoked (git-fixes). - nfsd: fix change_info in NFSv4 RENAME replies (git-fixes). - ntb: Clean up tx tail index on link down (git-fixes). - ntb: Drop packets when qp link is down (git-fixes). - ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes). - nvme-auth: use chap->s2 to indicate bidirectional authentication (bsc#1214543). - nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284). - nvme-tcp: add recovery_delay to sysfs (bsc#1201284). - nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284). - nvme-tcp: make 'err_work' a delayed work (bsc#1201284). - pNFS: Fix assignment of xprtdata.cred (git-fixes). - platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes). - platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes). - platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes). - platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes). - platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes). - platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes). - platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes). - platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes). - powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582). - powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729). - powerpc/xics: Remove unnecessary endian conversion (bsc#1065729). - printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875). - pwm: lpc32xx: Remove handling of PWM channels (git-fixes). - quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961). - quota: add new helper dquot_active() (bsc#1214998). - quota: factor out dquot_write_dquot() (bsc#1214995). - quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963). - quota: fix warning in dqgrab() (bsc#1214962). - quota: rename dquot_active() to inode_quota_active() (bsc#1214997). - s390/dasd: fix hanging device after request requeue (git-fixes bsc#1215124). - s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes). - s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148). - s390: add z16 elf platform (git-fixes bsc#1215956, bsc#1215957). - scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes). - scsi: 53c700: Check that command slot is not NULL (git-fixes). - scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes). - scsi: core: Fix possible memory leak if device_add() fails (git-fixes). - scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes). - scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes). - scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes). - scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes). - scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes). - scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes). - scsi: lpfc: Remove reftag check in DIF paths (git-fixes). - scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658). - scsi: qedf: Fix NULL dereference in error handling (git-fixes). - scsi: qedf: Fix firmware halt over suspend and resume (git-fixes). - scsi: qedi: Fix firmware halt over suspend and resume (git-fixes). - scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928). - scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928). - scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928). - scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes). - scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928). - scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928). - scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928). - scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928). - scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928). - scsi: qla2xxx: Remove unused declarations (bsc#1214928). - scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928). - scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928). - scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes). - scsi: scsi_debug: Remove dead code (git-fixes). - scsi: snic: Fix double free in snic_tgt_create() (git-fixes). - scsi: snic: Fix possible memory leak if device_add() fails (git-fixes). - scsi: storvsc: Handle additional SRB status values (git-fixes). - scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941). - selftests: mlxsw: Fix test failure on Spectrum-4 (jsc#PED-1549). - selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes). - spi: Add TPM HW flow flag (bsc#1213534) - spi: tegra210-quad: Enable TPM wait polling (bsc#1213534) - spi: tegra210-quad: set half duplex flag (bsc#1213534) - tcpm: Avoid soft reset when partner does not support get_status (git-fixes). - tpm_tis_spi: Add hardware wait polling (bsc#1213534) - tracing: Fix race issue between cpu buffer write and swap (git-fixes). - tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes). - tracing: Remove unnecessary copying of tr->current_trace (git-fixes). - uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes). - udf: Fix extension of the last extent in the file (bsc#1214964). - udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965). - udf: Fix off-by-one error when discarding preallocation (bsc#1214966). - udf: Fix uninitialized array access for some pathnames (bsc#1214967). - uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes). - usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes). - usb: ehci: move new member has_ci_pec_bug into hole (git-fixes). - usb: typec: tcpci: clear the fault status bit (git-fixes). - usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes). - vhost-scsi: unbreak any layout for response (git-fixes). - vhost: allow batching hint without size (git-fixes). - vhost: fix hung thread due to erroneous iotlb entries (git-fixes). - vhost: handle error while adding split ranges to iotlb (git-fixes). - vhost_vdpa: fix the crash in unmap a large memory (git-fixes). - virtio-blk: set req->state to MQ_RQ_COMPLETE after polling I/O is finished (git-fixes). - virtio-mmio: do not break lifecycle of vm_dev (git-fixes). - virtio-net: fix race between set queues and probe (git-fixes). - virtio-net: set queues after driver_ok (git-fixes). - virtio-rng: make device ready before making request (git-fixes). - virtio: acknowledge all features before access (git-fixes). - virtio_net: Fix probe failed when modprobe virtio_net (git-fixes). - virtio_net: add checking sq is full inside xdp xmit (git-fixes). - virtio_net: reorder some funcs (git-fixes). - virtio_net: separate the logic of checking whether sq is full (git-fixes). - virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes). - vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582). - watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes). - word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729). - x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes). - x86/alternative: Fix race in try_get_desc() (git-fixes). - x86/boot/e820: Fix typo in e820.c comment (git-fixes). - x86/bugs: Reset speculation control settings on init (git-fixes). - x86/coco: Allow CPU online/offline for a TDX VM with the paravisor on Hyper-V (bsc#1206453). - x86/coco: Export cc_vendor (bsc#1206453). - x86/cpu: Add Lunar Lake M (git-fixes). - x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes). - x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes). - x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes). - x86/hyperv: Add VTL specific structs and hypercalls (bsc#1206453). - x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests (bsc#1206453). - x86/hyperv: Add hv_write_efer() for a TDX VM with the paravisor (bsc#1206453). - x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES (bsc#1206453). - x86/hyperv: Add missing 'inline' to hv_snp_boot_ap() stub (bsc#1206453). - x86/hyperv: Add sev-snp enlightened guest static key (bsc#1206453) - x86/hyperv: Add smp support for SEV-SNP guest (bsc#1206453). - x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline (bsc#1206453). - x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests (bsc#1206453). - x86/hyperv: Fix undefined reference to isolation_type_en_snp without CONFIG_HYPERV (bsc#1206453). - x86/hyperv: Introduce a global variable hyperv_paravisor_present (bsc#1206453). - x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest (bsc#1206453). - x86/hyperv: Mark hv_ghcb_terminate() as noreturn (bsc#1206453). - x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's (bsc#1206453). - x86/hyperv: Remove hv_isolation_type_en_snp (bsc#1206453). - x86/hyperv: Set Virtual Trust Level in VMBus init message (bsc#1206453). - x86/hyperv: Support hypercalls for fully enlightened TDX guests (bsc#1206453). - x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor (bsc#1206453). - x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest (bsc#1206453). - x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes). - x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes). - x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes). - x86/mce: Retrieve poison range from hardware (git-fixes). - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes). - x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes). - x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes). - x86/purgatory: remove PGO flags (git-fixes). - x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes). - x86/resctl: fix scheduler confusion with 'current' (git-fixes). - x86/resctrl: Fix task CLOSID/RMID update race (git-fixes). - x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes). - x86/rtc: Remove __init for runtime functions (git-fixes). - x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635). - x86/sgx: Reduce delay and interference of enclave release (git-fixes). - x86/srso: Do not probe microcode in a guest (git-fixes). - x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes). - x86/srso: Fix srso_show_state() side effect (git-fixes). - x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes). - x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes). - xen: remove a confusing comment on auto-translated guest I/O (git-fixes). - xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
Patchnames: SUSE-2023-4058,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4058,openSUSE-SLE-15.5-2023-4058
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1065729 self
https://bugzilla.suse.com/1152472 self
https://bugzilla.suse.com/1187236 self
https://bugzilla.suse.com/1201284 self
https://bugzilla.suse.com/1202845 self
https://bugzilla.suse.com/1206453 self
https://bugzilla.suse.com/1208995 self
https://bugzilla.suse.com/1210169 self
https://bugzilla.suse.com/1210643 self
https://bugzilla.suse.com/1210658 self
https://bugzilla.suse.com/1212639 self
https://bugzilla.suse.com/1212703 self
https://bugzilla.suse.com/1213123 self
https://bugzilla.suse.com/1213534 self
https://bugzilla.suse.com/1213808 self
https://bugzilla.suse.com/1214022 self
https://bugzilla.suse.com/1214037 self
https://bugzilla.suse.com/1214040 self
https://bugzilla.suse.com/1214233 self
https://bugzilla.suse.com/1214351 self
https://bugzilla.suse.com/1214479 self
https://bugzilla.suse.com/1214543 self
https://bugzilla.suse.com/1214635 self
https://bugzilla.suse.com/1214813 self
https://bugzilla.suse.com/1214873 self
https://bugzilla.suse.com/1214928 self
https://bugzilla.suse.com/1214940 self
https://bugzilla.suse.com/1214941 self
https://bugzilla.suse.com/1214942 self
https://bugzilla.suse.com/1214943 self
https://bugzilla.suse.com/1214944 self
https://bugzilla.suse.com/1214945 self
https://bugzilla.suse.com/1214946 self
https://bugzilla.suse.com/1214947 self
https://bugzilla.suse.com/1214948 self
https://bugzilla.suse.com/1214949 self
https://bugzilla.suse.com/1214950 self
https://bugzilla.suse.com/1214951 self
https://bugzilla.suse.com/1214952 self
https://bugzilla.suse.com/1214953 self
https://bugzilla.suse.com/1214954 self
https://bugzilla.suse.com/1214955 self
https://bugzilla.suse.com/1214957 self
https://bugzilla.suse.com/1214958 self
https://bugzilla.suse.com/1214959 self
https://bugzilla.suse.com/1214961 self
https://bugzilla.suse.com/1214962 self
https://bugzilla.suse.com/1214963 self
https://bugzilla.suse.com/1214964 self
https://bugzilla.suse.com/1214965 self
https://bugzilla.suse.com/1214966 self
https://bugzilla.suse.com/1214967 self
https://bugzilla.suse.com/1214986 self
https://bugzilla.suse.com/1214988 self
https://bugzilla.suse.com/1214990 self
https://bugzilla.suse.com/1214991 self
https://bugzilla.suse.com/1214992 self
https://bugzilla.suse.com/1214993 self
https://bugzilla.suse.com/1214995 self
https://bugzilla.suse.com/1214997 self
https://bugzilla.suse.com/1214998 self
https://bugzilla.suse.com/1215115 self
https://bugzilla.suse.com/1215117 self
https://bugzilla.suse.com/1215123 self
https://bugzilla.suse.com/1215124 self
https://bugzilla.suse.com/1215148 self
https://bugzilla.suse.com/1215150 self
https://bugzilla.suse.com/1215221 self
https://bugzilla.suse.com/1215275 self
https://bugzilla.suse.com/1215322 self
https://bugzilla.suse.com/1215467 self
https://bugzilla.suse.com/1215523 self
https://bugzilla.suse.com/1215581 self
https://bugzilla.suse.com/1215752 self
https://bugzilla.suse.com/1215858 self
https://bugzilla.suse.com/1215860 self
https://bugzilla.suse.com/1215861 self
https://bugzilla.suse.com/1215875 self
https://bugzilla.suse.com/1215877 self
https://bugzilla.suse.com/1215894 self
https://bugzilla.suse.com/1215895 self
https://bugzilla.suse.com/1215896 self
https://bugzilla.suse.com/1215899 self
https://bugzilla.suse.com/1215911 self
https://bugzilla.suse.com/1215915 self
https://bugzilla.suse.com/1215916 self
https://bugzilla.suse.com/1215941 self
https://bugzilla.suse.com/1215956 self
https://bugzilla.suse.com/1215957 self
https://www.suse.com/security/cve/CVE-2023-1192/ self
https://www.suse.com/security/cve/CVE-2023-1206/ self
https://www.suse.com/security/cve/CVE-2023-1859/ self
https://www.suse.com/security/cve/CVE-2023-2177/ self
https://www.suse.com/security/cve/CVE-2023-37453/ self
https://www.suse.com/security/cve/CVE-2023-39192/ self
https://www.suse.com/security/cve/CVE-2023-39193/ self
https://www.suse.com/security/cve/CVE-2023-39194/ self
https://www.suse.com/security/cve/CVE-2023-40283/ self
https://www.suse.com/security/cve/CVE-2023-4155/ self
https://www.suse.com/security/cve/CVE-2023-42753/ self
https://www.suse.com/security/cve/CVE-2023-42754/ self
https://www.suse.com/security/cve/CVE-2023-4389/ self
https://www.suse.com/security/cve/CVE-2023-4622/ self
https://www.suse.com/security/cve/CVE-2023-4623/ self
https://www.suse.com/security/cve/CVE-2023-4881/ self
https://www.suse.com/security/cve/CVE-2023-4921/ self
https://www.suse.com/security/cve/CVE-2023-5345/ self
https://www.suse.com/security/cve/CVE-2023-1192 external
https://bugzilla.suse.com/1208995 external
https://www.suse.com/security/cve/CVE-2023-1206 external
https://bugzilla.suse.com/1212703 external
https://bugzilla.suse.com/1220015 external
https://www.suse.com/security/cve/CVE-2023-1859 external
https://bugzilla.suse.com/1210169 external
https://www.suse.com/security/cve/CVE-2023-2177 external
https://bugzilla.suse.com/1210643 external
https://www.suse.com/security/cve/CVE-2023-37453 external
https://bugzilla.suse.com/1213123 external
https://www.suse.com/security/cve/CVE-2023-39192 external
https://bugzilla.suse.com/1215858 external
https://bugzilla.suse.com/1220015 external
https://www.suse.com/security/cve/CVE-2023-39193 external
https://bugzilla.suse.com/1215860 external
https://bugzilla.suse.com/1220015 external
https://www.suse.com/security/cve/CVE-2023-39194 external
https://bugzilla.suse.com/1215861 external
https://www.suse.com/security/cve/CVE-2023-40283 external
https://bugzilla.suse.com/1214233 external
https://www.suse.com/security/cve/CVE-2023-4155 external
https://bugzilla.suse.com/1214022 external
https://www.suse.com/security/cve/CVE-2023-42753 external
https://bugzilla.suse.com/1215150 external
https://bugzilla.suse.com/1218613 external
https://www.suse.com/security/cve/CVE-2023-42754 external
https://bugzilla.suse.com/1215467 external
https://bugzilla.suse.com/1222212 external
https://www.suse.com/security/cve/CVE-2023-4389 external
https://bugzilla.suse.com/1214351 external
https://www.suse.com/security/cve/CVE-2023-4622 external
https://bugzilla.suse.com/1215117 external
https://bugzilla.suse.com/1215442 external
https://bugzilla.suse.com/1217531 external
https://bugzilla.suse.com/1219699 external
https://www.suse.com/security/cve/CVE-2023-4623 external
https://bugzilla.suse.com/1215115 external
https://bugzilla.suse.com/1215440 external
https://bugzilla.suse.com/1217444 external
https://bugzilla.suse.com/1217531 external
https://bugzilla.suse.com/1219698 external
https://bugzilla.suse.com/1221578 external
https://bugzilla.suse.com/1221598 external
https://www.suse.com/security/cve/CVE-2023-4881 external
https://bugzilla.suse.com/1215221 external
https://www.suse.com/security/cve/CVE-2023-4921 external
https://bugzilla.suse.com/1215275 external
https://bugzilla.suse.com/1215300 external
https://bugzilla.suse.com/1217444 external
https://bugzilla.suse.com/1217531 external
https://bugzilla.suse.com/1220906 external
https://bugzilla.suse.com/1223091 external
https://bugzilla.suse.com/1224418 external
https://www.suse.com/security/cve/CVE-2023-5345 external
https://bugzilla.suse.com/1215899 external
https://bugzilla.suse.com/1215971 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).\n- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).\n- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).\n- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).\n- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).\n- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation (bsc#1215899).\n- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).\n- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).\n- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).\n- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).\n- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).\n- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (bsc#1214022).\n- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).\n- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).\n- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).\n- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).\n- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).\n- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).\n- ARM: pxa: remove use of symbol_get() (git-fixes).\n- ASoC: SOF: core: Only call sof_ops_free() on remove if the probe was successful (git-fixes).\n- ASoC: amd: yc: Fix non-functional mic on Lenovo 82QF and 82UG (git-fixes).\n- ASoC: hdaudio.c: Add missing check for devm_kstrdup (git-fixes).\n- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).\n- ASoC: meson: spdifin: start hw on dai probe (git-fixes).\n- ASoC: rt5640: Fix IRQ not being free-ed for HDA jack detect mode (git-fixes).\n- ASoC: rt5640: Fix sleep in atomic context (git-fixes).\n- ASoC: rt5640: Revert \u0027Fix sleep in atomic context\u0027 (git-fixes).\n- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).\n- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).\n- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).\n- Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor (bsc#1206453).\n- Drivers: hv: vmbus: Support \u003e64 VPs for a fully enlightened TDX/SNP VM (bsc#1206453).\n- Drivers: hv: vmbus: Support fully enlightened TDX guests (bsc#1206453).\n- Drop amdgpu patch causing spamming (bsc#1215523).\n- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).\n- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).\n- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).\n- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).\n- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).\n- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).\n- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).\n- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).\n- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).\n- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).\n- KVM: x86: Fix KVM_CAP_SYNC_REGS\u0027s sync_regs() TOCTOU issues (git-fixes).\n- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).\n- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).\n- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).\n- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).\n- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).\n- NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes).\n- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).\n- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).\n- PCI: Free released resource after coalescing (git-fixes).\n- RDMA/siw: Fabricate a GID on tun and loopback devices (git-fixes)\n- Revert \u0027PCI: Mark NVIDIA T4 GPUs to avoid bus reset\u0027 (git-fixes).\n- Revert \u0027scsi: qla2xxx: Fix buffer overrun\u0027 (bsc#1214928).\n- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).\n- USB: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).\n- USB: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).\n- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)\n- arm64/hyperv: Use CPUHP_AP_HYPERV_ONLINE state to fix CPU online sequencing (bsc#1206453).\n- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).\n- arm64: module-plts: inline linux/moduleloader.h (git-fixes)\n- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)\n- arm64: sdei: abort running SDEI handlers during crash (git-fixes)\n- arm64: tegra: Update AHUB clock parent and rate (git-fixes)\n- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).\n- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).\n- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).\n- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).\n- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).\n- blacklist.conf: workqueue: compiler warning on 32-bit systems with Clang (bsc#1215877)\n- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).\n- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).\n- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).\n- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).\n- bpf: Clear the probe_addr for uprobe (git-fixes).\n- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).\n- clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest (bsc#1206453).\n- drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest (bsc#1206453).\n- drm/amd/display: Add smu write msg id fail retry process (git-fixes).\n- drm/amd/display: Remove wait while locked (git-fixes).\n- drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma (git-fixes).\n- drm/amd/display: fix the white screen issue when \u003e= 64GB DRAM (git-fixes).\n- drm/amd/display: prevent potential division by zero errors (git-fixes).\n- drm/amd/display: register edp_backlight_control() for DCN301 (git-fixes).\n- drm/ast: Add BMC virtual connector (bsc#1152472) Backporting changes: \t* rename ast_device to ast_private\n- drm/ast: report connection status on Display Port. (bsc#1152472) Backporting changes: \t* rename ast_device to ast_private \t* context changes\n- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).\n- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).\n- drm/i915/gvt: Put the page reference obtained by KVM\u0027s gfn_to_pfn() (git-fixes).\n- drm/i915/gvt: Verify pfn is \u0027valid\u0027 before dereferencing \u0027struct page\u0027 (git-fixes).\n- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).\n- drm/meson: fix memory leak on -\u003ehpd_notify callback (git-fixes).\n- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).\n- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).\n- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).\n- ext4: Remove ext4 locking of moved directory (bsc#1214957).\n- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).\n- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).\n- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).\n- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).\n- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).\n- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).\n- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).\n- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).\n- fs: Establish locking order for unrelated directories (bsc#1214958).\n- fs: Lock moved directories (bsc#1214959).\n- fs: do not update freeing inode i_io_list (bsc#1214813).\n- fs: lockd: avoid possible wrong NULL parameter (git-fixes).\n- fs: no need to check source (bsc#1215752).\n- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).\n- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).\n- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).\n- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).\n- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).\n- gve: Changes to add new TX queues (bsc#1214479).\n- gve: Control path for DQO-QPL (bsc#1214479).\n- gve: Fix gve interrupt names (bsc#1214479).\n- gve: RX path for DQO-QPL (bsc#1214479).\n- gve: Tx path for DQO-QPL (bsc#1214479).\n- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).\n- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).\n- gve: fix frag_list chaining (bsc#1214479).\n- gve: trivial spell fix Recive to Receive (bsc#1214479).\n- gve: use vmalloc_array and vcalloc (bsc#1214479).\n- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).\n- hwrng: virtio - add an internal buffer (git-fixes).\n- hwrng: virtio - always add a pending request (git-fixes).\n- hwrng: virtio - do not wait on cleanup (git-fixes).\n- hwrng: virtio - do not waste entropy (git-fixes).\n- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).\n- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).\n- i915/pmu: Move execlist stats initialization to execlist specific setup (git-fixes).\n- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).\n- iommu/virtio: Detach domain on endpoint release (git-fixes).\n- iommu/virtio: Return size mapped for a detached domain (git-fixes).\n- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).\n- jbd2: check \u0027jh-\u003eb_transaction\u0027 before removing it from checkpoint (bsc#1214953).\n- jbd2: correct the end of the journal recovery scan range (bsc#1214955).\n- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).\n- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).\n- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).\n- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).\n- jbd2: remove t_checkpoint_io_list (bsc#1214946).\n- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).\n- kabi/severities: ignore mlx4 internal symbols\n- s390/ipl: add support for List-Directed dump from ECKD DASD (jsc#PED-2023, jsc#PED-2025).\n- kconfig: fix possible buffer overflow (git-fixes).\n- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.\n- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.\n- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).\n- loop: Fix use-after-free issues (bsc#1214991).\n- loop: loop_set_status_from_info() check before assignment (bsc#1214990).\n- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).\n- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).\n- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).\n- mlx4: Delete custom device management logic (bsc#1187236).\n- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).\n- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).\n- mlx4: Move the bond work to the core driver (bsc#1187236).\n- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).\n- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).\n- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).\n- mlx4: Use \u0027void *\u0027 as the event param of mlx4_dispatch_event() (bsc#1187236).\n- module: Expose module_init_layout_section() (git-fixes)\n- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).\n- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).\n- net: mana: Add page pool for RX buffers (bsc#1214040).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).\n- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).\n- nfs/blocklayout: Use the passed in gfp flags (git-fixes).\n- nfsd: Fix race to FREE_STATEID and cl_revoked (git-fixes).\n- nfsd: fix change_info in NFSv4 RENAME replies (git-fixes).\n- ntb: Clean up tx tail index on link down (git-fixes).\n- ntb: Drop packets when qp link is down (git-fixes).\n- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).\n- nvme-auth: use chap-\u003es2 to indicate bidirectional authentication (bsc#1214543).\n- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).\n- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).\n- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).\n- nvme-tcp: make \u0027err_work\u0027 a delayed work (bsc#1201284).\n- pNFS: Fix assignment of xprtdata.cred (git-fixes).\n- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).\n- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).\n- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).\n- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).\n- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).\n- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).\n- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).\n- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).\n- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).\n- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).\n- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).\n- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).\n- quota: add new helper dquot_active() (bsc#1214998).\n- quota: factor out dquot_write_dquot() (bsc#1214995).\n- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).\n- quota: fix warning in dqgrab() (bsc#1214962).\n- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).\n- s390/dasd: fix hanging device after request requeue (git-fixes bsc#1215124).\n- s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes).\n- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).\n- s390: add z16 elf platform (git-fixes bsc#1215956, bsc#1215957).\n- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).\n- scsi: 53c700: Check that command slot is not NULL (git-fixes).\n- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).\n- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).\n- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).\n- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).\n- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).\n- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).\n- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).\n- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).\n- scsi: qedf: Fix NULL dereference in error handling (git-fixes).\n- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).\n- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).\n- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).\n- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).\n- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).\n- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).\n- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).\n- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).\n- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).\n- scsi: qla2xxx: Remove unused declarations (bsc#1214928).\n- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).\n- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).\n- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).\n- scsi: scsi_debug: Remove dead code (git-fixes).\n- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).\n- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: storvsc: Handle additional SRB status values (git-fixes).\n- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).\n- selftests: mlxsw: Fix test failure on Spectrum-4 (jsc#PED-1549).\n- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).\n- spi: Add TPM HW flow flag (bsc#1213534)\n- spi: tegra210-quad: Enable TPM wait polling (bsc#1213534)\n- spi: tegra210-quad: set half duplex flag (bsc#1213534)\n- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).\n- tpm_tis_spi: Add hardware wait polling (bsc#1213534)\n- tracing: Fix race issue between cpu buffer write and swap (git-fixes).\n- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).\n- tracing: Remove unnecessary copying of tr-\u003ecurrent_trace (git-fixes).\n- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).\n- udf: Fix extension of the last extent in the file (bsc#1214964).\n- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).\n- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).\n- udf: Fix uninitialized array access for some pathnames (bsc#1214967).\n- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).\n- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).\n- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).\n- usb: typec: tcpci: clear the fault status bit (git-fixes).\n- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).\n- vhost-scsi: unbreak any layout for response (git-fixes).\n- vhost: allow batching hint without size (git-fixes).\n- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).\n- vhost: handle error while adding split ranges to iotlb (git-fixes).\n- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).\n- virtio-blk: set req-\u003estate to MQ_RQ_COMPLETE after polling I/O is finished (git-fixes).\n- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).\n- virtio-net: fix race between set queues and probe (git-fixes).\n- virtio-net: set queues after driver_ok (git-fixes).\n- virtio-rng: make device ready before making request (git-fixes).\n- virtio: acknowledge all features before access (git-fixes).\n- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).\n- virtio_net: add checking sq is full inside xdp xmit (git-fixes).\n- virtio_net: reorder some funcs (git-fixes).\n- virtio_net: separate the logic of checking whether sq is full (git-fixes).\n- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).\n- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).\n- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).\n- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).\n- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).\n- x86/alternative: Fix race in try_get_desc() (git-fixes).\n- x86/boot/e820: Fix typo in e820.c comment (git-fixes).\n- x86/bugs: Reset speculation control settings on init (git-fixes).\n- x86/coco: Allow CPU online/offline for a TDX VM with the paravisor on Hyper-V (bsc#1206453).\n- x86/coco: Export cc_vendor (bsc#1206453).\n- x86/cpu: Add Lunar Lake M (git-fixes).\n- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).\n- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).\n- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).\n- x86/hyperv: Add VTL specific structs and hypercalls (bsc#1206453).\n- x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests (bsc#1206453).\n- x86/hyperv: Add hv_write_efer() for a TDX VM with the paravisor (bsc#1206453).\n- x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES (bsc#1206453).\n- x86/hyperv: Add missing \u0027inline\u0027 to hv_snp_boot_ap() stub (bsc#1206453).\n- x86/hyperv: Add sev-snp enlightened guest static key (bsc#1206453)\n- x86/hyperv: Add smp support for SEV-SNP guest (bsc#1206453).\n- x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline (bsc#1206453).\n- x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests (bsc#1206453).\n- x86/hyperv: Fix undefined reference to isolation_type_en_snp without CONFIG_HYPERV (bsc#1206453).\n- x86/hyperv: Introduce a global variable hyperv_paravisor_present (bsc#1206453).\n- x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest (bsc#1206453).\n- x86/hyperv: Mark hv_ghcb_terminate() as noreturn (bsc#1206453).\n- x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef\u0027s (bsc#1206453).\n- x86/hyperv: Remove hv_isolation_type_en_snp (bsc#1206453).\n- x86/hyperv: Set Virtual Trust Level in VMBus init message (bsc#1206453).\n- x86/hyperv: Support hypercalls for fully enlightened TDX guests (bsc#1206453).\n- x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor (bsc#1206453).\n- x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest (bsc#1206453).\n- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).\n- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).\n- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).\n- x86/mce: Retrieve poison range from hardware (git-fixes).\n- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).\n- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).\n- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).\n- x86/purgatory: remove PGO flags (git-fixes).\n- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).\n- x86/resctl: fix scheduler confusion with \u0027current\u0027 (git-fixes).\n- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).\n- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).\n- x86/rtc: Remove __init for runtime functions (git-fixes).\n- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).\n- x86/sgx: Reduce delay and interference of enclave release (git-fixes).\n- x86/srso: Do not probe microcode in a guest (git-fixes).\n- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).\n- x86/srso: Fix srso_show_state() side effect (git-fixes).\n- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).\n- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).\n- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).\n- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2023-4058,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4058,openSUSE-SLE-15.5-2023-4058",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4058-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2023:4058-1",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234058-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2023:4058-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187236",
        "url": "https://bugzilla.suse.com/1187236"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201284",
        "url": "https://bugzilla.suse.com/1201284"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202845",
        "url": "https://bugzilla.suse.com/1202845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206453",
        "url": "https://bugzilla.suse.com/1206453"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208995",
        "url": "https://bugzilla.suse.com/1208995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210169",
        "url": "https://bugzilla.suse.com/1210169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210643",
        "url": "https://bugzilla.suse.com/1210643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210658",
        "url": "https://bugzilla.suse.com/1210658"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212639",
        "url": "https://bugzilla.suse.com/1212639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212703",
        "url": "https://bugzilla.suse.com/1212703"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213123",
        "url": "https://bugzilla.suse.com/1213123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213534",
        "url": "https://bugzilla.suse.com/1213534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213808",
        "url": "https://bugzilla.suse.com/1213808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214022",
        "url": "https://bugzilla.suse.com/1214022"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214037",
        "url": "https://bugzilla.suse.com/1214037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214040",
        "url": "https://bugzilla.suse.com/1214040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214233",
        "url": "https://bugzilla.suse.com/1214233"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214351",
        "url": "https://bugzilla.suse.com/1214351"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214479",
        "url": "https://bugzilla.suse.com/1214479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214543",
        "url": "https://bugzilla.suse.com/1214543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214635",
        "url": "https://bugzilla.suse.com/1214635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214813",
        "url": "https://bugzilla.suse.com/1214813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214873",
        "url": "https://bugzilla.suse.com/1214873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214928",
        "url": "https://bugzilla.suse.com/1214928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214940",
        "url": "https://bugzilla.suse.com/1214940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214941",
        "url": "https://bugzilla.suse.com/1214941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214942",
        "url": "https://bugzilla.suse.com/1214942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214943",
        "url": "https://bugzilla.suse.com/1214943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214944",
        "url": "https://bugzilla.suse.com/1214944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214945",
        "url": "https://bugzilla.suse.com/1214945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214946",
        "url": "https://bugzilla.suse.com/1214946"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214947",
        "url": "https://bugzilla.suse.com/1214947"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214948",
        "url": "https://bugzilla.suse.com/1214948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214949",
        "url": "https://bugzilla.suse.com/1214949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214950",
        "url": "https://bugzilla.suse.com/1214950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214951",
        "url": "https://bugzilla.suse.com/1214951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214952",
        "url": "https://bugzilla.suse.com/1214952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214953",
        "url": "https://bugzilla.suse.com/1214953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214954",
        "url": "https://bugzilla.suse.com/1214954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214955",
        "url": "https://bugzilla.suse.com/1214955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214957",
        "url": "https://bugzilla.suse.com/1214957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214958",
        "url": "https://bugzilla.suse.com/1214958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214959",
        "url": "https://bugzilla.suse.com/1214959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214961",
        "url": "https://bugzilla.suse.com/1214961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214962",
        "url": "https://bugzilla.suse.com/1214962"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214963",
        "url": "https://bugzilla.suse.com/1214963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214964",
        "url": "https://bugzilla.suse.com/1214964"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214965",
        "url": "https://bugzilla.suse.com/1214965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214966",
        "url": "https://bugzilla.suse.com/1214966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214967",
        "url": "https://bugzilla.suse.com/1214967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214986",
        "url": "https://bugzilla.suse.com/1214986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214988",
        "url": "https://bugzilla.suse.com/1214988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214990",
        "url": "https://bugzilla.suse.com/1214990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214991",
        "url": "https://bugzilla.suse.com/1214991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214992",
        "url": "https://bugzilla.suse.com/1214992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214993",
        "url": "https://bugzilla.suse.com/1214993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214995",
        "url": "https://bugzilla.suse.com/1214995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214997",
        "url": "https://bugzilla.suse.com/1214997"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214998",
        "url": "https://bugzilla.suse.com/1214998"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215115",
        "url": "https://bugzilla.suse.com/1215115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215117",
        "url": "https://bugzilla.suse.com/1215117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215123",
        "url": "https://bugzilla.suse.com/1215123"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215124",
        "url": "https://bugzilla.suse.com/1215124"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215148",
        "url": "https://bugzilla.suse.com/1215148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215150",
        "url": "https://bugzilla.suse.com/1215150"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215221",
        "url": "https://bugzilla.suse.com/1215221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215275",
        "url": "https://bugzilla.suse.com/1215275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215322",
        "url": "https://bugzilla.suse.com/1215322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215467",
        "url": "https://bugzilla.suse.com/1215467"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215523",
        "url": "https://bugzilla.suse.com/1215523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215581",
        "url": "https://bugzilla.suse.com/1215581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215752",
        "url": "https://bugzilla.suse.com/1215752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215858",
        "url": "https://bugzilla.suse.com/1215858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215860",
        "url": "https://bugzilla.suse.com/1215860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215861",
        "url": "https://bugzilla.suse.com/1215861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215875",
        "url": "https://bugzilla.suse.com/1215875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215877",
        "url": "https://bugzilla.suse.com/1215877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215894",
        "url": "https://bugzilla.suse.com/1215894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215895",
        "url": "https://bugzilla.suse.com/1215895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215896",
        "url": "https://bugzilla.suse.com/1215896"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215899",
        "url": "https://bugzilla.suse.com/1215899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215911",
        "url": "https://bugzilla.suse.com/1215911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215915",
        "url": "https://bugzilla.suse.com/1215915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215916",
        "url": "https://bugzilla.suse.com/1215916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215941",
        "url": "https://bugzilla.suse.com/1215941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215956",
        "url": "https://bugzilla.suse.com/1215956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215957",
        "url": "https://bugzilla.suse.com/1215957"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1206 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1859 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1859/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2177 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2177/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-37453 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-37453/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39193 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39194 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-40283 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-40283/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4155 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42753 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42754 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4389 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4389/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4622 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4622/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4623 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4623/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4881 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4921 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4921/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-5345 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-5345/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2023-10-12T08:00:01Z",
      "generator": {
        "date": "2023-10-12T08:00:01Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2023:4058-1",
      "initial_release_date": "2023-10-12T08:00:01Z",
      "revision_history": [
        {
          "date": "2023-10-12T08:00:01Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-azure-extra-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-azure-optional-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
                  "product_id": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.14.21-150500.33.20.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.14.21-150500.33.20.1.noarch",
                  "product_id": "kernel-source-azure-5.14.21-150500.33.20.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-extra-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-optional-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150500.33.20.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150500.33.20.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150500.33.20.1.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150500.33.20.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-1192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1192",
          "url": "https://www.suse.com/security/cve/CVE-2023-1192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208995 for CVE-2023-1192",
          "url": "https://bugzilla.suse.com/1208995"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1192"
    },
    {
      "cve": "CVE-2023-1206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u0027s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1206",
          "url": "https://www.suse.com/security/cve/CVE-2023-1206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212703 for CVE-2023-1206",
          "url": "https://bugzilla.suse.com/1212703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-1206",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1206"
    },
    {
      "cve": "CVE-2023-1859",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1859"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1859",
          "url": "https://www.suse.com/security/cve/CVE-2023-1859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210169 for CVE-2023-1859",
          "url": "https://bugzilla.suse.com/1210169"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1859"
    },
    {
      "cve": "CVE-2023-2177",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2177"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2177",
          "url": "https://www.suse.com/security/cve/CVE-2023-2177"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210643 for CVE-2023-2177",
          "url": "https://bugzilla.suse.com/1210643"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-2177"
    },
    {
      "cve": "CVE-2023-37453",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-37453"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-37453",
          "url": "https://www.suse.com/security/cve/CVE-2023-37453"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213123 for CVE-2023-37453",
          "url": "https://bugzilla.suse.com/1213123"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-37453"
    },
    {
      "cve": "CVE-2023-39192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39192",
          "url": "https://www.suse.com/security/cve/CVE-2023-39192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215858 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1215858"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39192"
    },
    {
      "cve": "CVE-2023-39193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39193",
          "url": "https://www.suse.com/security/cve/CVE-2023-39193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215860 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1215860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39193"
    },
    {
      "cve": "CVE-2023-39194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39194",
          "url": "https://www.suse.com/security/cve/CVE-2023-39194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215861 for CVE-2023-39194",
          "url": "https://bugzilla.suse.com/1215861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39194"
    },
    {
      "cve": "CVE-2023-40283",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-40283"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-40283",
          "url": "https://www.suse.com/security/cve/CVE-2023-40283"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214233 for CVE-2023-40283",
          "url": "https://bugzilla.suse.com/1214233"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-40283"
    },
    {
      "cve": "CVE-2023-4155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4155",
          "url": "https://www.suse.com/security/cve/CVE-2023-4155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214022 for CVE-2023-4155",
          "url": "https://bugzilla.suse.com/1214022"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4155"
    },
    {
      "cve": "CVE-2023-42753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42753",
          "url": "https://www.suse.com/security/cve/CVE-2023-42753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215150 for CVE-2023-42753",
          "url": "https://bugzilla.suse.com/1215150"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218613 for CVE-2023-42753",
          "url": "https://bugzilla.suse.com/1218613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-42754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42754",
          "url": "https://www.suse.com/security/cve/CVE-2023-42754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215467 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1215467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222212 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1222212"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42754"
    },
    {
      "cve": "CVE-2023-4389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4389",
          "url": "https://www.suse.com/security/cve/CVE-2023-4389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214351 for CVE-2023-4389",
          "url": "https://bugzilla.suse.com/1214351"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4389"
    },
    {
      "cve": "CVE-2023-4622",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4622"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer\u0027s recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4622",
          "url": "https://www.suse.com/security/cve/CVE-2023-4622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215117 for CVE-2023-4622",
          "url": "https://bugzilla.suse.com/1215117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215442 for CVE-2023-4622",
          "url": "https://bugzilla.suse.com/1215442"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-4622",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219699 for CVE-2023-4622",
          "url": "https://bugzilla.suse.com/1219699"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-4622"
    },
    {
      "cve": "CVE-2023-4623",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4623"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4623",
          "url": "https://www.suse.com/security/cve/CVE-2023-4623"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215115 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1215115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215440 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1215440"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219698 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1219698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-4623"
    },
    {
      "cve": "CVE-2023-4881",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4881"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4881",
          "url": "https://www.suse.com/security/cve/CVE-2023-4881"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215221 for CVE-2023-4881",
          "url": "https://bugzilla.suse.com/1215221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4881"
    },
    {
      "cve": "CVE-2023-4921",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4921"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4921",
          "url": "https://www.suse.com/security/cve/CVE-2023-4921"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215275 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1215275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215300 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1215300"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220906 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1220906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223091 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1223091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224418 for CVE-2023-4921",
          "url": "https://bugzilla.suse.com/1224418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-4921"
    },
    {
      "cve": "CVE-2023-5345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-5345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
          "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-5345",
          "url": "https://www.suse.com/security/cve/CVE-2023-5345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215899 for CVE-2023-5345",
          "url": "https://bugzilla.suse.com/1215899"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215971 for CVE-2023-5345",
          "url": "https://bugzilla.suse.com/1215971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.20.1.noarch",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.20.1.x86_64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.aarch64",
            "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-10-12T08:00:01Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-5345"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…