{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.160.1","kernel-azure-base":"4.12.14-16.160.1","kernel-azure-devel":"4.12.14-16.160.1","kernel-devel-azure":"4.12.14-16.160.1","kernel-source-azure":"4.12.14-16.160.1","kernel-syms-azure":"4.12.14-16.160.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.160.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n\nThe following non-security bugs were fixed:\n\n- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).\n- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).\n- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).\n- cpu/SMT: Store the current/max number of threads (bsc#1214408).\n- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- dm-raid: remove useless checking in raid_message() (git-fixes).\n- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).\n- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).\n- md/bitmap: always wake up md_thread in timeout_store (git-fixes).\n- md/bitmap: factor out a helper to set timeout (git-fixes).\n- md/raid10: Do not add spare disk when recovery fails (git-fixes).\n- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).\n- md/raid10: clean up md_add_new_disk() (git-fixes).\n- md/raid10: fix io loss while replacement replace rdev (git-fixes).\n- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).\n- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).\n- md/raid10: fix memleak of md thread (git-fixes).\n- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).\n- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).\n- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).\n- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).\n- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).\n- md/raid10: prevent soft lockup while flush writes (git-fixes).\n- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).\n- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).\n- md: add new workqueue for delete rdev (git-fixes).\n- md: avoid signed overflow in slot_store() (git-fixes).\n- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).\n- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).\n- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).\n- md: fix deadlock causing by sysfs_notify (git-fixes).\n- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).\n- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).\n- md: get sysfs entry after redundancy attr group create (git-fixes).\n- md: refactor mddev_find_or_alloc (git-fixes).\n- md: remove lock_bdev / unlock_bdev (git-fixes).\n- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.\n- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).\n- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).\n- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).\n- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).\n- usb: serial: option: add Telit FE990 compositions (git-fixes).\n- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).\n- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).\n- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).\n- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n","id":"SUSE-SU-2023:4883-1","modified":"2023-12-15T10:41:00Z","published":"2023-12-15T10:41:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234883-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216259"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217603"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0461"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5717"}],"related":["CVE-2023-0461","CVE-2023-31083","CVE-2023-39197","CVE-2023-39198","CVE-2023-45863","CVE-2023-45871","CVE-2023-5717"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-0461","CVE-2023-31083","CVE-2023-39197","CVE-2023-39198","CVE-2023-45863","CVE-2023-45871","CVE-2023-5717"]}