[SUSE-SU-2024:0156-1] Security update for the Linux Kernel

Severity Important
Affected Packages 54
CVEs 10

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
  • CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
  • CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
  • CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237).
  • CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
  • CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
  • CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258).
  • CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253).
  • CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
  • CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250).

The following non-security bugs were fixed:

  • Reviewed and added more information to README.SUSE (jsc#PED-5021).
  • Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184).
  • Drop drm/bridge lt9611uxc patches that have been reverted on stable trees
  • KVM: s390/mm: Properly reset no-dat (bsc#1218056).
  • KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933).
  • KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
  • NFS: Fix O_DIRECT locking issues (bsc#1211162).
  • NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
  • NFS: Fix a potential data corruption (bsc#1211162).
  • NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
  • NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
  • NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
  • NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
  • NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
  • NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
  • Updated SPI patches for NVIDIA Grace enablement (bsc#1212584 jsc#PED-3459)
  • block: fix revalidate performance regression (bsc#1216057).
  • bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234).
  • ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
  • ceph: fix type promotion bug on 32bit systems (bsc#1217982).
  • clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
  • clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
  • clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
  • clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
  • clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
  • clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
  • clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
  • clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
  • dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
  • fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659).
  • libceph: use kernel_connect() (bsc#1217981).
  • mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
  • net/smc: Fix pos miscalculation in statistics (bsc#1218139).
  • net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
  • nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
  • remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
  • s390/vx: fix save/restore of fpu kernel context (bsc#1218357).
  • scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
  • swiotlb: fix a braino in the alignment check fix (bsc#1216559).
  • swiotlb: fix slot alignment checks (bsc#1216559).
  • tracing: Disable preemption when using the filter buffer (bsc#1217036).
  • tracing: Fix a possible race when disabling buffered events (bsc#1217036).
  • tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
  • tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
  • tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
  • tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
  • uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
  • vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
  • x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
  • x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
  • x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
  • x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
  • x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
Package Affected Version
pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=opensuse-leap-micro-5.4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=opensuse-leap-micro-5.3 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=opensuse-leap-micro-5.4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=opensuse-leap-micro-5.4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=opensuse-leap-micro-5.3 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sled-15&sp=4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=opensuse-leap-micro-5.4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=opensuse-leap-micro-5.3 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=opensuse-leap-micro-5.4 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=opensuse-leap-micro-5.3 < 5.14.21-150400.24.103.1.150400.24.48.1
pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=4 < 5.14.21-150400.24.103.1
ID
SUSE-SU-2024:0156-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2024/suse-su-20240156-1/
Published
2024-01-18T16:01:42
(7 months ago)
Modified
2024-01-18T16:01:42
(7 months ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0156-1.json
Suse URL for SUSE-SU-2024:0156-1 https://www.suse.com/support/update/announcement/2024/suse-su-20240156-1/
Suse E-Mail link for SUSE-SU-2024:0156-1 https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html
Bugzilla SUSE Bug 1179610 https://bugzilla.suse.com/1179610
Bugzilla SUSE Bug 1183045 https://bugzilla.suse.com/1183045
Bugzilla SUSE Bug 1193285 https://bugzilla.suse.com/1193285
Bugzilla SUSE Bug 1211162 https://bugzilla.suse.com/1211162
Bugzilla SUSE Bug 1211226 https://bugzilla.suse.com/1211226
Bugzilla SUSE Bug 1212584 https://bugzilla.suse.com/1212584
Bugzilla SUSE Bug 1214747 https://bugzilla.suse.com/1214747
Bugzilla SUSE Bug 1214823 https://bugzilla.suse.com/1214823
Bugzilla SUSE Bug 1215237 https://bugzilla.suse.com/1215237
Bugzilla SUSE Bug 1215696 https://bugzilla.suse.com/1215696
Bugzilla SUSE Bug 1215885 https://bugzilla.suse.com/1215885
Bugzilla SUSE Bug 1216057 https://bugzilla.suse.com/1216057
Bugzilla SUSE Bug 1216559 https://bugzilla.suse.com/1216559
Bugzilla SUSE Bug 1216776 https://bugzilla.suse.com/1216776
Bugzilla SUSE Bug 1217036 https://bugzilla.suse.com/1217036
Bugzilla SUSE Bug 1217217 https://bugzilla.suse.com/1217217
Bugzilla SUSE Bug 1217250 https://bugzilla.suse.com/1217250
Bugzilla SUSE Bug 1217602 https://bugzilla.suse.com/1217602
Bugzilla SUSE Bug 1217692 https://bugzilla.suse.com/1217692
Bugzilla SUSE Bug 1217790 https://bugzilla.suse.com/1217790
Bugzilla SUSE Bug 1217801 https://bugzilla.suse.com/1217801
Bugzilla SUSE Bug 1217933 https://bugzilla.suse.com/1217933
Bugzilla SUSE Bug 1217938 https://bugzilla.suse.com/1217938
Bugzilla SUSE Bug 1217946 https://bugzilla.suse.com/1217946
Bugzilla SUSE Bug 1217947 https://bugzilla.suse.com/1217947
Bugzilla SUSE Bug 1217980 https://bugzilla.suse.com/1217980
Bugzilla SUSE Bug 1217981 https://bugzilla.suse.com/1217981
Bugzilla SUSE Bug 1217982 https://bugzilla.suse.com/1217982
Bugzilla SUSE Bug 1218056 https://bugzilla.suse.com/1218056
Bugzilla SUSE Bug 1218139 https://bugzilla.suse.com/1218139
Bugzilla SUSE Bug 1218184 https://bugzilla.suse.com/1218184
Bugzilla SUSE Bug 1218234 https://bugzilla.suse.com/1218234
Bugzilla SUSE Bug 1218253 https://bugzilla.suse.com/1218253
Bugzilla SUSE Bug 1218258 https://bugzilla.suse.com/1218258
Bugzilla SUSE Bug 1218335 https://bugzilla.suse.com/1218335
Bugzilla SUSE Bug 1218357 https://bugzilla.suse.com/1218357
Bugzilla SUSE Bug 1218447 https://bugzilla.suse.com/1218447
Bugzilla SUSE Bug 1218515 https://bugzilla.suse.com/1218515
Bugzilla SUSE Bug 1218559 https://bugzilla.suse.com/1218559
Bugzilla SUSE Bug 1218569 https://bugzilla.suse.com/1218569
Bugzilla SUSE Bug 1218659 https://bugzilla.suse.com/1218659
CVE SUSE CVE CVE-2020-26555 page https://www.suse.com/security/cve/CVE-2020-26555/
CVE SUSE CVE CVE-2023-51779 page https://www.suse.com/security/cve/CVE-2023-51779/
CVE SUSE CVE CVE-2023-6121 page https://www.suse.com/security/cve/CVE-2023-6121/
CVE SUSE CVE CVE-2023-6531 page https://www.suse.com/security/cve/CVE-2023-6531/
CVE SUSE CVE CVE-2023-6546 page https://www.suse.com/security/cve/CVE-2023-6546/
CVE SUSE CVE CVE-2023-6606 page https://www.suse.com/security/cve/CVE-2023-6606/
CVE SUSE CVE CVE-2023-6610 page https://www.suse.com/security/cve/CVE-2023-6610/
CVE SUSE CVE CVE-2023-6622 page https://www.suse.com/security/cve/CVE-2023-6622/
CVE SUSE CVE CVE-2023-6931 page https://www.suse.com/security/cve/CVE-2023-6931/
CVE SUSE CVE CVE-2023-6932 page https://www.suse.com/security/cve/CVE-2023-6932/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=4 suse reiserfs-kmp-default < 5.14.21-150400.24.103.1 sles-15 x86_64
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=4 suse reiserfs-kmp-default < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=4 suse reiserfs-kmp-default < 5.14.21-150400.24.103.1 sles-15 ppc64le
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=4 suse reiserfs-kmp-default < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=4 suse kernel-zfcpdump < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=4 suse kernel-syms < 5.14.21-150400.24.103.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-15&sp=4 suse kernel-syms < 5.14.21-150400.24.103.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=4 suse kernel-syms < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=4 suse kernel-syms < 5.14.21-150400.24.103.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=4 suse kernel-syms < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=4 suse kernel-source < 5.14.21-150400.24.103.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-15&sp=4 suse kernel-source < 5.14.21-150400.24.103.1 sled-15 noarch
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=4 suse kernel-obs-build < 5.14.21-150400.24.103.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sled-15&sp=4 suse kernel-obs-build < 5.14.21-150400.24.103.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=4 suse kernel-obs-build < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=4 suse kernel-obs-build < 5.14.21-150400.24.103.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=4 suse kernel-obs-build < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=4 suse kernel-macros < 5.14.21-150400.24.103.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-15&sp=4 suse kernel-macros < 5.14.21-150400.24.103.1 sled-15 noarch
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=4 suse kernel-docs < 5.14.21-150400.24.103.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sled-15&sp=4 suse kernel-docs < 5.14.21-150400.24.103.1 sled-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=4 suse kernel-devel < 5.14.21-150400.24.103.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-15&sp=4 suse kernel-devel < 5.14.21-150400.24.103.1 sled-15 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=4 suse kernel-default < 5.14.21-150400.24.103.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 suse kernel-default < 5.14.21-150400.24.103.1 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-15&sp=4 suse kernel-default < 5.14.21-150400.24.103.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=opensuse-leap-micro-5.4 suse kernel-default < 5.14.21-150400.24.103.1 opensuse-leap-micro-5.4 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=opensuse-leap-micro-5.3 suse kernel-default < 5.14.21-150400.24.103.1 opensuse-leap-micro-5.3 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=4 suse kernel-default < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 suse kernel-default < 5.14.21-150400.24.103.1 slem-5 s390x
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=opensuse-leap-micro-5.4 suse kernel-default < 5.14.21-150400.24.103.1 opensuse-leap-micro-5.4 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=4 suse kernel-default < 5.14.21-150400.24.103.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=4 suse kernel-default < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 suse kernel-default < 5.14.21-150400.24.103.1 slem-5 aarch64
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=opensuse-leap-micro-5.4 suse kernel-default < 5.14.21-150400.24.103.1 opensuse-leap-micro-5.4 aarch64
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=opensuse-leap-micro-5.3 suse kernel-default < 5.14.21-150400.24.103.1 opensuse-leap-micro-5.3 aarch64
Affected pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-15&sp=4 suse kernel-default-extra < 5.14.21-150400.24.103.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=4 suse kernel-default-devel < 5.14.21-150400.24.103.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-15&sp=4 suse kernel-default-devel < 5.14.21-150400.24.103.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=4 suse kernel-default-devel < 5.14.21-150400.24.103.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=4 suse kernel-default-devel < 5.14.21-150400.24.103.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=4 suse kernel-default-devel < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sled-15&sp=4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 sled-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=opensuse-leap-micro-5.4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 opensuse-leap-micro-5.4 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=opensuse-leap-micro-5.3 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 opensuse-leap-micro-5.3 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 slem-5 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=opensuse-leap-micro-5.4 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 opensuse-leap-micro-5.4 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=opensuse-leap-micro-5.3 suse kernel-default-base < 5.14.21-150400.24.103.1.150400.24.48.1 opensuse-leap-micro-5.3 aarch64
Affected pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=4 suse kernel-64kb < 5.14.21-150400.24.103.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=4 suse kernel-64kb-devel < 5.14.21-150400.24.103.1 sles-15 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...