{"id":"SUSE-SU-2023:4347-1","summary":"Security update for the Linux Kernel","details":"\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-\u003eerasesize) that could cause a local DoS. (bsc#1210778)\n- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)\n- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).\n- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)\n- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).\n- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).\n- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).\n- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).\n- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).\n- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).\n- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).\n- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).\n- CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).\n- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).\n- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).\n- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).\n- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).\n\nThe following non-security bugs were fixed:\n\n- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.\n- mkspec: Allow unsupported KMPs (bsc#1214386)\n- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.\n","modified":"2026-02-04T04:12:33.775645Z","published":"2023-11-02T14:36:57Z","related":["CVE-2020-36766","CVE-2023-1192","CVE-2023-1206","CVE-2023-1859","CVE-2023-31085","CVE-2023-34324","CVE-2023-39189","CVE-2023-39192","CVE-2023-39193","CVE-2023-39194","CVE-2023-40283","CVE-2023-42754","CVE-2023-45862","CVE-2023-4622","CVE-2023-4623","CVE-2023-4881","CVE-2023-4921"],"upstream":["CVE-2020-36766","CVE-2023-1192","CVE-2023-1206","CVE-2023-1859","CVE-2023-31085","CVE-2023-34324","CVE-2023-39189","CVE-2023-39192","CVE-2023-39193","CVE-2023-39194","CVE-2023-40283","CVE-2023-42754","CVE-2023-45862","CVE-2023-4622","CVE-2023-4623","CVE-2023-4881","CVE-2023-4921"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234347-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214380"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-1859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-40283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-42754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4622"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4921"}],"affected":[{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP1","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"4.12.14-150100.197.160.1","kernel-livepatch-4_12_14-150100_197_160-default":"1-150100.3.3.1","kernel-default-livepatch-devel":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-livepatch-SLE15-SP1_Update_45","ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP1","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_45&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1-150100.3.3.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"4.12.14-150100.197.160.1","kernel-livepatch-4_12_14-150100_197_160-default":"1-150100.3.3.1","kernel-default-livepatch-devel":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP1","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"ocfs2-kmp-default":"4.12.14-150100.197.160.1","gfs2-kmp-default":"4.12.14-150100.197.160.1","dlm-kmp-default":"4.12.14-150100.197.160.1","cluster-md-kmp-default":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-docs","ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-obs-build","ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-source","ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-syms","ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-docs","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-obs-build","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-source","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-syms","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-default","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-docs","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-obs-build","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-source","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-syms","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-macros":"4.12.14-150100.197.160.1","kernel-default":"4.12.14-150100.197.160.1","kernel-default-devel":"4.12.14-150100.197.160.1","kernel-syms":"4.12.14-150100.197.160.1","kernel-obs-build":"4.12.14-150100.197.160.1","kernel-source":"4.12.14-150100.197.160.1","kernel-devel":"4.12.14-150100.197.160.1","reiserfs-kmp-default":"4.12.14-150100.197.160.1","kernel-docs":"4.12.14-150100.197.160.1","kernel-default-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-debug","ecosystem":"openSUSE:Leap 15.4","purl":"pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-zfcpdump-man":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1","kernel-kvmsmall-base":"4.12.14-150100.197.160.1","kernel-debug-base":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-default","ecosystem":"openSUSE:Leap 15.4","purl":"pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-zfcpdump-man":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1","kernel-kvmsmall-base":"4.12.14-150100.197.160.1","kernel-debug-base":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-kvmsmall","ecosystem":"openSUSE:Leap 15.4","purl":"pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-zfcpdump-man":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1","kernel-kvmsmall-base":"4.12.14-150100.197.160.1","kernel-debug-base":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-vanilla","ecosystem":"openSUSE:Leap 15.4","purl":"pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-zfcpdump-man":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1","kernel-kvmsmall-base":"4.12.14-150100.197.160.1","kernel-debug-base":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-zfcpdump","ecosystem":"openSUSE:Leap 15.4","purl":"pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-zfcpdump-man":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1","kernel-kvmsmall-base":"4.12.14-150100.197.160.1","kernel-debug-base":"4.12.14-150100.197.160.1","kernel-default-man":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}},{"package":{"name":"kernel-vanilla","ecosystem":"openSUSE:Leap 15.5","purl":"pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.12.14-150100.197.160.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-vanilla":"4.12.14-150100.197.160.1","kernel-vanilla-livepatch-devel":"4.12.14-150100.197.160.1","kernel-vanilla-devel":"4.12.14-150100.197.160.1","kernel-vanilla-base":"4.12.14-150100.197.160.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:4347-1.json"}}],"schema_version":"1.7.3"}