{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"kernel-devel-6.5.6-1.1 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the kernel-devel-6.5.6-1.1 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-13305","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13305-1.json"},{"category":"self","summary":"SUSE CVE CVE-2023-1192 page","url":"https://www.suse.com/security/cve/CVE-2023-1192/"},{"category":"self","summary":"SUSE CVE CVE-2023-39192 page","url":"https://www.suse.com/security/cve/CVE-2023-39192/"},{"category":"self","summary":"SUSE CVE CVE-2023-39193 page","url":"https://www.suse.com/security/cve/CVE-2023-39193/"},{"category":"self","summary":"SUSE CVE CVE-2023-42753 page","url":"https://www.suse.com/security/cve/CVE-2023-42753/"},{"category":"self","summary":"SUSE CVE CVE-2023-42754 page","url":"https://www.suse.com/security/cve/CVE-2023-42754/"},{"category":"self","summary":"SUSE CVE CVE-2023-42756 page","url":"https://www.suse.com/security/cve/CVE-2023-42756/"},{"category":"self","summary":"SUSE CVE CVE-2023-4623 page","url":"https://www.suse.com/security/cve/CVE-2023-4623/"},{"category":"self","summary":"SUSE CVE CVE-2023-5345 page","url":"https://www.suse.com/security/cve/CVE-2023-5345/"}],"title":"kernel-devel-6.5.6-1.1 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:13305-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-devel-6.5.6-1.1.aarch64","product":{"name":"kernel-devel-6.5.6-1.1.aarch64","product_id":"kernel-devel-6.5.6-1.1.aarch64"}},{"category":"product_version","name":"kernel-macros-6.5.6-1.1.aarch64","product":{"name":"kernel-macros-6.5.6-1.1.aarch64","product_id":"kernel-macros-6.5.6-1.1.aarch64"}},{"category":"product_version","name":"kernel-source-6.5.6-1.1.aarch64","product":{"name":"kernel-source-6.5.6-1.1.aarch64","product_id":"kernel-source-6.5.6-1.1.aarch64"}},{"category":"product_version","name":"kernel-source-vanilla-6.5.6-1.1.aarch64","product":{"name":"kernel-source-vanilla-6.5.6-1.1.aarch64","product_id":"kernel-source-vanilla-6.5.6-1.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"kernel-devel-6.5.6-1.1.ppc64le","product":{"name":"kernel-devel-6.5.6-1.1.ppc64le","product_id":"kernel-devel-6.5.6-1.1.ppc64le"}},{"category":"product_version","name":"kernel-macros-6.5.6-1.1.ppc64le","product":{"name":"kernel-macros-6.5.6-1.1.ppc64le","product_id":"kernel-macros-6.5.6-1.1.ppc64le"}},{"category":"product_version","name":"kernel-source-6.5.6-1.1.ppc64le","product":{"name":"kernel-source-6.5.6-1.1.ppc64le","product_id":"kernel-source-6.5.6-1.1.ppc64le"}},{"category":"product_version","name":"kernel-source-vanilla-6.5.6-1.1.ppc64le","product":{"name":"kernel-source-vanilla-6.5.6-1.1.ppc64le","product_id":"kernel-source-vanilla-6.5.6-1.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"kernel-devel-6.5.6-1.1.s390x","product":{"name":"kernel-devel-6.5.6-1.1.s390x","product_id":"kernel-devel-6.5.6-1.1.s390x"}},{"category":"product_version","name":"kernel-macros-6.5.6-1.1.s390x","product":{"name":"kernel-macros-6.5.6-1.1.s390x","product_id":"kernel-macros-6.5.6-1.1.s390x"}},{"category":"product_version","name":"kernel-source-6.5.6-1.1.s390x","product":{"name":"kernel-source-6.5.6-1.1.s390x","product_id":"kernel-source-6.5.6-1.1.s390x"}},{"category":"product_version","name":"kernel-source-vanilla-6.5.6-1.1.s390x","product":{"name":"kernel-source-vanilla-6.5.6-1.1.s390x","product_id":"kernel-source-vanilla-6.5.6-1.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"kernel-devel-6.5.6-1.1.x86_64","product":{"name":"kernel-devel-6.5.6-1.1.x86_64","product_id":"kernel-devel-6.5.6-1.1.x86_64"}},{"category":"product_version","name":"kernel-macros-6.5.6-1.1.x86_64","product":{"name":"kernel-macros-6.5.6-1.1.x86_64","product_id":"kernel-macros-6.5.6-1.1.x86_64"}},{"category":"product_version","name":"kernel-source-6.5.6-1.1.x86_64","product":{"name":"kernel-source-6.5.6-1.1.x86_64","product_id":"kernel-source-6.5.6-1.1.x86_64"}},{"category":"product_version","name":"kernel-source-vanilla-6.5.6-1.1.x86_64","product":{"name":"kernel-source-vanilla-6.5.6-1.1.x86_64","product_id":"kernel-source-vanilla-6.5.6-1.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-devel-6.5.6-1.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64"},"product_reference":"kernel-devel-6.5.6-1.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-6.5.6-1.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le"},"product_reference":"kernel-devel-6.5.6-1.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-6.5.6-1.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x"},"product_reference":"kernel-devel-6.5.6-1.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-6.5.6-1.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64"},"product_reference":"kernel-devel-6.5.6-1.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-6.5.6-1.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64"},"product_reference":"kernel-macros-6.5.6-1.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-6.5.6-1.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le"},"product_reference":"kernel-macros-6.5.6-1.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-6.5.6-1.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x"},"product_reference":"kernel-macros-6.5.6-1.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-6.5.6-1.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64"},"product_reference":"kernel-macros-6.5.6-1.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-6.5.6-1.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64"},"product_reference":"kernel-source-6.5.6-1.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-6.5.6-1.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le"},"product_reference":"kernel-source-6.5.6-1.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-6.5.6-1.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x"},"product_reference":"kernel-source-6.5.6-1.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-6.5.6-1.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64"},"product_reference":"kernel-source-6.5.6-1.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-vanilla-6.5.6-1.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64"},"product_reference":"kernel-source-vanilla-6.5.6-1.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-vanilla-6.5.6-1.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le"},"product_reference":"kernel-source-vanilla-6.5.6-1.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-vanilla-6.5.6-1.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x"},"product_reference":"kernel-source-vanilla-6.5.6-1.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-vanilla-6.5.6-1.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"},"product_reference":"kernel-source-vanilla-6.5.6-1.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2023-1192","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-1192"}],"notes":[{"category":"general","text":"A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-1192","url":"https://www.suse.com/security/cve/CVE-2023-1192"},{"category":"external","summary":"SUSE Bug 1208995 for CVE-2023-1192","url":"https://bugzilla.suse.com/1208995"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2023-1192"},{"cve":"CVE-2023-39192","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-39192"}],"notes":[{"category":"general","text":"A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-39192","url":"https://www.suse.com/security/cve/CVE-2023-39192"},{"category":"external","summary":"SUSE Bug 1215858 for CVE-2023-39192","url":"https://bugzilla.suse.com/1215858"},{"category":"external","summary":"SUSE Bug 1220015 for CVE-2023-39192","url":"https://bugzilla.suse.com/1220015"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2023-39192"},{"cve":"CVE-2023-39193","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-39193"}],"notes":[{"category":"general","text":"A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-39193","url":"https://www.suse.com/security/cve/CVE-2023-39193"},{"category":"external","summary":"SUSE Bug 1215860 for CVE-2023-39193","url":"https://bugzilla.suse.com/1215860"},{"category":"external","summary":"SUSE Bug 1220015 for CVE-2023-39193","url":"https://bugzilla.suse.com/1220015"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2023-39193"},{"cve":"CVE-2023-42753","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-42753"}],"notes":[{"category":"general","text":"An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-42753","url":"https://www.suse.com/security/cve/CVE-2023-42753"},{"category":"external","summary":"SUSE Bug 1215150 for CVE-2023-42753","url":"https://bugzilla.suse.com/1215150"},{"category":"external","summary":"SUSE Bug 1218613 for CVE-2023-42753","url":"https://bugzilla.suse.com/1218613"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2023-42753"},{"cve":"CVE-2023-42754","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-42754"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-42754","url":"https://www.suse.com/security/cve/CVE-2023-42754"},{"category":"external","summary":"SUSE Bug 1215467 for CVE-2023-42754","url":"https://bugzilla.suse.com/1215467"},{"category":"external","summary":"SUSE Bug 1222212 for CVE-2023-42754","url":"https://bugzilla.suse.com/1222212"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2023-42754"},{"cve":"CVE-2023-42756","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-42756"}],"notes":[{"category":"general","text":"A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-42756","url":"https://www.suse.com/security/cve/CVE-2023-42756"},{"category":"external","summary":"SUSE Bug 1215767 for CVE-2023-42756","url":"https://bugzilla.suse.com/1215767"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2023-42756"},{"cve":"CVE-2023-4623","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-4623"}],"notes":[{"category":"general","text":"A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-4623","url":"https://www.suse.com/security/cve/CVE-2023-4623"},{"category":"external","summary":"SUSE Bug 1215115 for CVE-2023-4623","url":"https://bugzilla.suse.com/1215115"},{"category":"external","summary":"SUSE Bug 1215440 for CVE-2023-4623","url":"https://bugzilla.suse.com/1215440"},{"category":"external","summary":"SUSE Bug 1217444 for CVE-2023-4623","url":"https://bugzilla.suse.com/1217444"},{"category":"external","summary":"SUSE Bug 1217531 for CVE-2023-4623","url":"https://bugzilla.suse.com/1217531"},{"category":"external","summary":"SUSE Bug 1219698 for CVE-2023-4623","url":"https://bugzilla.suse.com/1219698"},{"category":"external","summary":"SUSE Bug 1221578 for CVE-2023-4623","url":"https://bugzilla.suse.com/1221578"},{"category":"external","summary":"SUSE Bug 1221598 for CVE-2023-4623","url":"https://bugzilla.suse.com/1221598"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2023-4623"},{"cve":"CVE-2023-5345","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-5345"}],"notes":[{"category":"general","text":"A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-5345","url":"https://www.suse.com/security/cve/CVE-2023-5345"},{"category":"external","summary":"SUSE Bug 1215899 for CVE-2023-5345","url":"https://bugzilla.suse.com/1215899"},{"category":"external","summary":"SUSE Bug 1215971 for CVE-2023-5345","url":"https://bugzilla.suse.com/1215971"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-devel-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-macros-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-6.5.6-1.1.x86_64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.aarch64","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.ppc64le","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.s390x","openSUSE Tumbleweed:kernel-source-vanilla-6.5.6-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"important"}],"title":"CVE-2023-5345"}]}