[SUSE-SU-2023:4347-1] Security update for the Linux Kernel

Severity Important
Affected Packages 66
CVEs 17

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)
  • CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
  • CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
  • CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
  • CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
  • CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
  • CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
  • CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
  • CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
  • CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
  • CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
  • CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
  • CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
  • CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
  • CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
  • CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
  • CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

  • check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
  • mkspec: Allow unsupported KMPs (bsc#1214386)
  • old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
Package Affected Version
pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.5 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
pkg:rpm/suse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.4 < 4.12.14-150100.197.160.1
ID
SUSE-SU-2023:4347-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2023/suse-su-20234347-1/
Published
2023-11-02T14:36:57
(10 months ago)
Modified
2023-11-02T14:36:57
(10 months ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4347-1.json
Suse URL for SUSE-SU-2023:4347-1 https://www.suse.com/support/update/announcement/2023/suse-su-20234347-1/
Suse E-Mail link for SUSE-SU-2023:4347-1 https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html
Bugzilla SUSE Bug 1208995 https://bugzilla.suse.com/1208995
Bugzilla SUSE Bug 1210169 https://bugzilla.suse.com/1210169
Bugzilla SUSE Bug 1210778 https://bugzilla.suse.com/1210778
Bugzilla SUSE Bug 1212703 https://bugzilla.suse.com/1212703
Bugzilla SUSE Bug 1214233 https://bugzilla.suse.com/1214233
Bugzilla SUSE Bug 1214380 https://bugzilla.suse.com/1214380
Bugzilla SUSE Bug 1214386 https://bugzilla.suse.com/1214386
Bugzilla SUSE Bug 1215115 https://bugzilla.suse.com/1215115
Bugzilla SUSE Bug 1215117 https://bugzilla.suse.com/1215117
Bugzilla SUSE Bug 1215221 https://bugzilla.suse.com/1215221
Bugzilla SUSE Bug 1215275 https://bugzilla.suse.com/1215275
Bugzilla SUSE Bug 1215299 https://bugzilla.suse.com/1215299
Bugzilla SUSE Bug 1215467 https://bugzilla.suse.com/1215467
Bugzilla SUSE Bug 1215745 https://bugzilla.suse.com/1215745
Bugzilla SUSE Bug 1215858 https://bugzilla.suse.com/1215858
Bugzilla SUSE Bug 1215860 https://bugzilla.suse.com/1215860
Bugzilla SUSE Bug 1215861 https://bugzilla.suse.com/1215861
Bugzilla SUSE Bug 1216046 https://bugzilla.suse.com/1216046
Bugzilla SUSE Bug 1216051 https://bugzilla.suse.com/1216051
CVE SUSE CVE CVE-2020-36766 page https://www.suse.com/security/cve/CVE-2020-36766/
CVE SUSE CVE CVE-2023-1192 page https://www.suse.com/security/cve/CVE-2023-1192/
CVE SUSE CVE CVE-2023-1206 page https://www.suse.com/security/cve/CVE-2023-1206/
CVE SUSE CVE CVE-2023-1859 page https://www.suse.com/security/cve/CVE-2023-1859/
CVE SUSE CVE CVE-2023-31085 page https://www.suse.com/security/cve/CVE-2023-31085/
CVE SUSE CVE CVE-2023-34324 page https://www.suse.com/security/cve/CVE-2023-34324/
CVE SUSE CVE CVE-2023-39189 page https://www.suse.com/security/cve/CVE-2023-39189/
CVE SUSE CVE CVE-2023-39192 page https://www.suse.com/security/cve/CVE-2023-39192/
CVE SUSE CVE CVE-2023-39193 page https://www.suse.com/security/cve/CVE-2023-39193/
CVE SUSE CVE CVE-2023-39194 page https://www.suse.com/security/cve/CVE-2023-39194/
CVE SUSE CVE CVE-2023-40283 page https://www.suse.com/security/cve/CVE-2023-40283/
CVE SUSE CVE CVE-2023-42754 page https://www.suse.com/security/cve/CVE-2023-42754/
CVE SUSE CVE CVE-2023-45862 page https://www.suse.com/security/cve/CVE-2023-45862/
CVE SUSE CVE CVE-2023-4622 page https://www.suse.com/security/cve/CVE-2023-4622/
CVE SUSE CVE CVE-2023-4623 page https://www.suse.com/security/cve/CVE-2023-4623/
CVE SUSE CVE CVE-2023-4881 page https://www.suse.com/security/cve/CVE-2023-4881/
CVE SUSE CVE CVE-2023-4921 page https://www.suse.com/security/cve/CVE-2023-4921/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 suse reiserfs-kmp-default < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.4 suse kernel-zfcpdump-man < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.5 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.5 x86_64
Affected pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.5 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.5 s390x
Affected pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.4 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.5 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.5 ppc64le
Affected pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.4 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.5 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.5 aarch64
Affected pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.4 suse kernel-vanilla < 4.12.14-150100.197.160.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.5 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 x86_64
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.5 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 s390x
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.4 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.5 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.4 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.5 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 aarch64
Affected pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.4 suse kernel-vanilla-livepatch-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.5 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 x86_64
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.5 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 s390x
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.4 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.5 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.4 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.5 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.5 aarch64
Affected pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.4 suse kernel-vanilla-devel < 4.12.14-150100.197.160.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.5 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.5 x86_64
Affected pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.5 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.5 s390x
Affected pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.4 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.5 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.5 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.4 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 ppc64le
Affected pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.5 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.5 aarch64
Affected pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.4 suse kernel-vanilla-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 aarch64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 suse kernel-syms < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 suse kernel-source < 4.12.14-150100.197.160.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 suse kernel-obs-build < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 suse kernel-macros < 4.12.14-150100.197.160.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-kvmsmall-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 suse kernel-docs < 4.12.14-150100.197.160.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 suse kernel-devel < 4.12.14-150100.197.160.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 suse kernel-default < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 suse kernel-default < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 suse kernel-default < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 suse kernel-default-man < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.4 suse kernel-default-man < 4.12.14-150100.197.160.1 opensuse-leap-15.4 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 suse kernel-default-devel < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-150100.197.160.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-150100.197.160.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-150100.197.160.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 suse kernel-default-base < 4.12.14-150100.197.160.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.4 suse kernel-debug-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 x86_64
Affected pkg:rpm/suse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.4 suse kernel-debug-base < 4.12.14-150100.197.160.1 opensuse-leap-15.4 ppc64le
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...