{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-95.117.1","dlm-kmp-default":"4.12.14-95.117.1","gfs2-kmp-default":"4.12.14-95.117.1","ocfs2-kmp-default":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-95.117.1","kernel-default-kgraft-devel":"4.12.14-95.117.1","kgraft-patch-4_12_14-95_117-default":"1-6.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-95.117.1","kernel-default-kgraft-devel":"4.12.14-95.117.1","kgraft-patch-4_12_14-95_117-default":"1-6.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP4","name":"kgraft-patch-SLE12-SP4_Update_33","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_33&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-6.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-default-man":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-default-man":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.12.14-95.117.1","kernel-default-base":"4.12.14-95.117.1","kernel-default-devel":"4.12.14-95.117.1","kernel-default-man":"4.12.14-95.117.1","kernel-devel":"4.12.14-95.117.1","kernel-macros":"4.12.14-95.117.1","kernel-source":"4.12.14-95.117.1","kernel-syms":"4.12.14-95.117.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-95.117.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bnc#1207237).\n- CVE-2023-23454: Fixed denial or service in cbq_classify in net/sched/sch_cbq.c (bnc#1207036).\n- CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bnc#1206664).\n- CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bnc#1206073).\n\nThe following non-security bugs were fixed:\n\n- Added support for enabling livepatching related packages on -RT (jsc#PED-1706).\n- Added suse-kernel-rpm-scriptlets to kmp buildreqs (boo#1205149).\n- Reverted 'constraints: increase disk space for all architectures' (bsc#1203693). \n- HID: betop: check shape of output reports (bsc#1207186).\n- HID: betop: fix slab-out-of-bounds Write in betop_probe (bsc#1207186).\n- HID: check empty report_list in hid_validate_values() (bsc#1206784).\n- net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036).\n- net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036).\n- sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).\n\n","id":"SUSE-SU-2023:0407-1","modified":"2023-02-14T12:08:14Z","published":"2023-02-14T12:08:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230407-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-47929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23454"}],"related":["CVE-2022-3564","CVE-2022-4662","CVE-2022-47929","CVE-2023-23454"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-3564","CVE-2022-4662","CVE-2022-47929","CVE-2023-23454"]}