<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3182-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-08-03T19:41:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-08-03T19:41:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-08-03T19:41:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">

The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-3609: Fixed an use-after-free vulnerability in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write vulnerability in net/sched (bsc#1213585).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).

The following non-security bugs were fixed:

- Add MODULE_FIRMWARE() for FIRMWARE_TG357766 (git-fixes).
- Drop patch that caused issues with k3s (bsc#1213705).
- Enable NXP SNVS RTC driver for i.MX 8MQ/8MP (jsc#PED-4758)
- Fix documentation of panic_on_warn (git-fixes).
- Fixed launch issue on 15-SP5 (git-fixes, bsc#1210853).
- Revert 'arm64: dts: zynqmp: Add address-cells property to interrupt (git-fixes)
- Revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).
- acpi: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- alsa: fireface: make read-only const array for model names static (git-fixes).
- alsa: hda/realtek - remove 3k pull low procedure (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G614Jx (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GA402X (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GX650P (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GZ301V (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NPx0SNx (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).
- alsa: hda/realtek: Add quirks for Unis H3C Desktop B760 &amp; Q760 (git-fixes).
- alsa: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).
- alsa: hda/realtek: Amend G634 quirk to enable rear speakers (git-fixes).
- alsa: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).
- alsa: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).
- alsa: hda/realtek: Whitespace fix (git-fixes).
- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- alsa: oxfw: make read-only const array models static (git-fixes).
- alsa: pcm: Fix potential data race at PCM memory allocation helpers (git-fixes).
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- arm64/mm: mark private VM_FAULT_X defines as vm_fault_t (git-fixes)
- arm64: dts: microchip: sparx5: do not use PSCI on reference boards (git-fixes)
- arm64: vdso: Pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- asoc: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd938x: fix codec initialisation race (git-fixes).
- asoc: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).
- asoc: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- asoc: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- asoc: tegra: Fix ADX byte map (git-fixes).
- asoc: tegra: Fix AMX byte map (git-fixes).
- can: bcm: Fix UAF in bcm_proc_show() (git-fixes).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in DebugData (bsc#1193629).
- cifs: print client_guid in DebugData (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- clk: qcom: camcc-sc7180: Add parent dependency to all camera GDSCs (git-fixes).
- clk: qcom: gcc-ipq6018: Use floor ops for sdcc clocks (git-fixes).
- codel: fix kernel-doc notation warnings (git-fixes).
- crypto: kpp - Add helper to set reqsize (git-fixes).
- crypto: qat - Use helper to set reqsize (git-fixes).
- devlink: fix kernel-doc notation warnings (git-fixes).
- docs: networking: Update codeaurora references for rmnet (git-fixes).
- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- documentation: timers: hrtimers: Make hybrid union historical (git-fixes).
- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).
- drm/amdgpu: Set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: Validate VM ioctl flags (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).
- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/client: Fix memory leak in drm_client_target_cloned (git-fixes).
- drm/i915/psr: Use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915: Fix one wrong caching mode enum usage (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/panel: simple: Add Powertip PH800480T013 drm_display_mode flags (git-fixes).
- drm/panel: simple: Add connector_type for innolux_at043tn24 (git-fixes).
- drm/ttm: Do not leak a resource on swapout move error (git-fixes).
- dt-bindings: phy: brcm,brcmstb-usb-phy: Fix error in 'compatible' conditional schema (git-fixes).
- ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: add EA_INODE checking to ext4_iget() (bsc#1213106).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
- ext4: fix WARNING in mb_find_extent (bsc#1213099).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix lockdep warning when enabling MMP (bsc#1213100).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- fuse: ioctl: translate ENOSYS in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- hvcs: Fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: Get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: Synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: Use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: Use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: Use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (adm1275) Allow setting sample averaging (git-fixes).
- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).
- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).
- ib/hfi1: Use bitmap_zalloc() when applicable (git-fixes)
- inotify: Avoid reporting event with invalid wd (bsc#1213025).
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).
- kABI: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kabi/severities: Add VAS symbols changed due to recent fix VAS accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).
- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: cec: i2c: ch7322: also select REGMAP (git-fixes).
- media: i2c: Correct format propagation for st-mipid02 (git-fixes).
- media: usb: Check az6007_read() return value (git-fixes).
- media: usb: siano: Fix warning due to null work_func_t function pointer (git-fixes).
- media: venus: helpers: Fix ALIGN() of non power of two (git-fixes).
- media: videodev2.h: Fix struct v4l2_input tuner index comment (git-fixes).
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).
- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).
- net: mana: Add support for vlan tagging (bsc#1212301).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- ntb: amd: Fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- ntb: idt: Fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: Fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- ntb: ntb_tool: Add check for devm_kcalloc (git-fixes).
- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme: introduce nvme_start_request (bsc#1210565).
- ocfs2: Switch to security_inode_init_security() (git-fixes).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- opp: Fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- pci/pm: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- phy: Revert 'phy: Remove SOC_EXYNOS4212 dep. from PHY_EXYNOS4X12_USB' (git-fixes).
- phy: tegra: xusb: Clear the driver reference in usb-phy dev (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- pie: fix kernel-doc notation warning (git-fixes).
- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).
- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).
- powerpc/64: Only WARN if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: Fix VAS mm use after free (bsc#1194869).
- powerpc/book3s64/mm: Fix DirectMap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: Fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: Remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: Do not read MSR from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: Switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: Assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: Fix kernel config grep (bsc#1194869).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- pwm: ab8500: Fix error code in probe() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: sysfs: Do not apply state to already disabled PWMs (git-fixes).
- rdma/rxe: Fix access checks in rxe_check_bind_mw (git-fixes)
- rpm/check-for-config-changes: ignore also RISCV_ISA_* and DYNAMIC_SIGFRAME They depend on CONFIG_TOOLCHAIN_HAS_*.
- rsi: remove kernel-doc comment marker (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/debug: add _ASM_S390_ prefix to header guard (git-fixes bsc#1213263).
- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390: define RUNTIME_DISCARD_EXIT to fix link error with GNU ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched: Fix DEBUG &amp;&amp; !SCHEDSTATS warn (git-fixes)
- security: keys: Modify mismatched function name (git-fixes).
- selftests: mptcp: depend on SYN_COOKIES (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add ConnTrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- signal/powerpc: On swapcontext failure force SIGSEGV (bsc#1194869).
- signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in SMB2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared DFS root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in CIFSFindFirst() (bsc#1193629).
- smb: client: fix warning in CIFSFindNext() (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve DFS mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubi: ensure that VID header offset + VID header size &amp;lt;= alloc, size (bsc#1210584).
- udf: Avoid double brelse() in udf_rename() (bsc#1213032).
- udf: Define EFSCORRUPTED error code (bsc#1213038).
- udf: Detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: Discard preallocation before extending file with a hole (bsc#1213036).
- udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).
- udf: Do not bother merging very long extents (bsc#1213040).
- udf: Do not update file length for failed writes to inline files (bsc#1213041).
- udf: Fix error handling in udf_new_inode() (bsc#1213112).
- udf: Fix extending file within last block (bsc#1213037).
- udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: Preserve link count of system files (bsc#1213113).
- udf: Truncate added extents on failed expansion (bsc#1213039).
- usb: dwc2: Fix some error handling paths (git-fixes).
- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).
- usb: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).
- usb: serial: option: add LARA-R6 01B PIDs (git-fixes).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- writeback: fix call of incorrect macro (bsc#1213024).
- x86: Fix .brk attribute in linker script (git-fixes).
- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).
- xfs: CIL work is serialised, not pipelined (bsc#1211811).
- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).
- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk AIL insertion (git-fixes).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from CIL commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: move the CIL workqueue to the CIL (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order CIL checkpoint start records (bsc#1211811).
- xfs: pass a CIL context to xlog_write() (bsc#1211811).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down AIL (bsc#1211811).
- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).
- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).
- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-3182,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3182,openSUSE-SLE-15.4-2023-3182</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      <Description>Link for SUSE-SU-2023:3182-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3182-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150305</URL>
      <Description>SUSE Bug 1150305</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193629</URL>
      <Description>SUSE Bug 1193629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194869</URL>
      <Description>SUSE Bug 1194869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207894</URL>
      <Description>SUSE Bug 1207894</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208788</URL>
      <Description>SUSE Bug 1208788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210565</URL>
      <Description>SUSE Bug 1210565</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210584</URL>
      <Description>SUSE Bug 1210584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210853</URL>
      <Description>SUSE Bug 1210853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211243</URL>
      <Description>SUSE Bug 1211243</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211811</URL>
      <Description>SUSE Bug 1211811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211867</URL>
      <Description>SUSE Bug 1211867</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212301</URL>
      <Description>SUSE Bug 1212301</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212846</URL>
      <Description>SUSE Bug 1212846</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212905</URL>
      <Description>SUSE Bug 1212905</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213010</URL>
      <Description>SUSE Bug 1213010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213011</URL>
      <Description>SUSE Bug 1213011</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213012</URL>
      <Description>SUSE Bug 1213012</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213013</URL>
      <Description>SUSE Bug 1213013</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213014</URL>
      <Description>SUSE Bug 1213014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213015</URL>
      <Description>SUSE Bug 1213015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213016</URL>
      <Description>SUSE Bug 1213016</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213017</URL>
      <Description>SUSE Bug 1213017</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213018</URL>
      <Description>SUSE Bug 1213018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213019</URL>
      <Description>SUSE Bug 1213019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213020</URL>
      <Description>SUSE Bug 1213020</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213021</URL>
      <Description>SUSE Bug 1213021</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213024</URL>
      <Description>SUSE Bug 1213024</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213025</URL>
      <Description>SUSE Bug 1213025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213032</URL>
      <Description>SUSE Bug 1213032</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213034</URL>
      <Description>SUSE Bug 1213034</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213035</URL>
      <Description>SUSE Bug 1213035</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213036</URL>
      <Description>SUSE Bug 1213036</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213037</URL>
      <Description>SUSE Bug 1213037</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213038</URL>
      <Description>SUSE Bug 1213038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213039</URL>
      <Description>SUSE Bug 1213039</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213040</URL>
      <Description>SUSE Bug 1213040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213041</URL>
      <Description>SUSE Bug 1213041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213059</URL>
      <Description>SUSE Bug 1213059</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213061</URL>
      <Description>SUSE Bug 1213061</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213087</URL>
      <Description>SUSE Bug 1213087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213088</URL>
      <Description>SUSE Bug 1213088</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213089</URL>
      <Description>SUSE Bug 1213089</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213090</URL>
      <Description>SUSE Bug 1213090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213092</URL>
      <Description>SUSE Bug 1213092</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213093</URL>
      <Description>SUSE Bug 1213093</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213094</URL>
      <Description>SUSE Bug 1213094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213095</URL>
      <Description>SUSE Bug 1213095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213096</URL>
      <Description>SUSE Bug 1213096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213098</URL>
      <Description>SUSE Bug 1213098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213099</URL>
      <Description>SUSE Bug 1213099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213100</URL>
      <Description>SUSE Bug 1213100</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213102</URL>
      <Description>SUSE Bug 1213102</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213103</URL>
      <Description>SUSE Bug 1213103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213104</URL>
      <Description>SUSE Bug 1213104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213105</URL>
      <Description>SUSE Bug 1213105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213106</URL>
      <Description>SUSE Bug 1213106</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213107</URL>
      <Description>SUSE Bug 1213107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213108</URL>
      <Description>SUSE Bug 1213108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213109</URL>
      <Description>SUSE Bug 1213109</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213110</URL>
      <Description>SUSE Bug 1213110</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213111</URL>
      <Description>SUSE Bug 1213111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213112</URL>
      <Description>SUSE Bug 1213112</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213113</URL>
      <Description>SUSE Bug 1213113</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213114</URL>
      <Description>SUSE Bug 1213114</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213134</URL>
      <Description>SUSE Bug 1213134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213245</URL>
      <Description>SUSE Bug 1213245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213247</URL>
      <Description>SUSE Bug 1213247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213252</URL>
      <Description>SUSE Bug 1213252</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213258</URL>
      <Description>SUSE Bug 1213258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213259</URL>
      <Description>SUSE Bug 1213259</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213263</URL>
      <Description>SUSE Bug 1213263</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213264</URL>
      <Description>SUSE Bug 1213264</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213286</URL>
      <Description>SUSE Bug 1213286</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213523</URL>
      <Description>SUSE Bug 1213523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213524</URL>
      <Description>SUSE Bug 1213524</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213543</URL>
      <Description>SUSE Bug 1213543</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213585</URL>
      <Description>SUSE Bug 1213585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213586</URL>
      <Description>SUSE Bug 1213586</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213705</URL>
      <Description>SUSE Bug 1213705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-20593/</URL>
      <Description>SUSE CVE CVE-2023-20593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2985/</URL>
      <Description>SUSE CVE CVE-2023-2985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3117/</URL>
      <Description>SUSE CVE CVE-2023-3117 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-31248/</URL>
      <Description>SUSE CVE CVE-2023-31248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3390/</URL>
      <Description>SUSE CVE CVE-2023-3390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-35001/</URL>
      <Description>SUSE CVE CVE-2023-35001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3609/</URL>
      <Description>SUSE CVE CVE-2023-3609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3611/</URL>
      <Description>SUSE CVE CVE-2023-3611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3812/</URL>
      <Description>SUSE CVE CVE-2023-3812 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4" CPE="cpe:/o:suse:sle-module-public-cloud:15:sp4">SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="cluster-md-kmp-azure-5.14.21-150400.14.60.1">cluster-md-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="dlm-kmp-azure-5.14.21-150400.14.60.1">dlm-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="gfs2-kmp-azure-5.14.21-150400.14.60.1">gfs2-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-azure-5.14.21-150400.14.60.1">kernel-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-devel-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-azure-devel-5.14.21-150400.14.60.1">kernel-azure-devel-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-extra-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-azure-extra-5.14.21-150400.14.60.1">kernel-azure-extra-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-livepatch-devel-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-azure-livepatch-devel-5.14.21-150400.14.60.1">kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-azure-optional-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-azure-optional-5.14.21-150400.14.60.1">kernel-azure-optional-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-devel-azure-5.14.21-150400.14.60.1">kernel-devel-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-source-azure-5.14.21-150400.14.60.1">kernel-source-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kernel-syms-azure-5.14.21-150400.14.60.1">kernel-syms-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="kselftests-kmp-azure-5.14.21-150400.14.60.1">kselftests-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="ocfs2-kmp-azure-5.14.21-150400.14.60.1">ocfs2-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-azure-5.14.21-150400.14.60.1">
      <FullProductName ProductID="reiserfs-kmp-azure-5.14.21-150400.14.60.1">reiserfs-kmp-azure-5.14.21-150400.14.60.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1">kernel-azure-5.14.21-150400.14.60.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1">kernel-azure-devel-5.14.21-150400.14.60.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1">kernel-devel-azure-5.14.21-150400.14.60.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1">kernel-source-azure-5.14.21-150400.14.60.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Public Cloud 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1">kernel-syms-azure-5.14.21-150400.14.60.1 as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1">cluster-md-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1">dlm-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1">gfs2-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1">kernel-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-devel-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1">kernel-azure-devel-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-extra-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1">kernel-azure-extra-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-livepatch-devel-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1">kernel-azure-livepatch-devel-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-azure-optional-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1">kernel-azure-optional-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1">kernel-devel-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1">kernel-source-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1">kernel-syms-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kselftests-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1">kselftests-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1">ocfs2-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="reiserfs-kmp-azure-5.14.21-150400.14.60.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1">reiserfs-kmp-azure-5.14.21-150400.14.60.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.






</Note>
    </Notes>
    <CVE>CVE-2023-20593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-20593.html</URL>
        <Description>CVE-2023-20593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213286</URL>
        <Description>SUSE Bug 1213286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213616</URL>
        <Description>SUSE Bug 1213616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215674</URL>
        <Description>SUSE Bug 1215674</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.</Note>
    </Notes>
    <CVE>CVE-2023-2985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2985.html</URL>
        <Description>CVE-2023-2985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211867</URL>
        <Description>SUSE Bug 1211867</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** Duplicate of CVE-2023-3390.</Note>
    </Notes>
    <CVE>CVE-2023-3117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3117.html</URL>
        <Description>CVE-2023-3117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212934</URL>
        <Description>SUSE Bug 1212934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213245</URL>
        <Description>SUSE Bug 1213245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace</Note>
    </Notes>
    <CVE>CVE-2023-31248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-31248.html</URL>
        <Description>CVE-2023-31248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213061</URL>
        <Description>SUSE Bug 1213061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213064</URL>
        <Description>SUSE Bug 1213064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.</Note>
    </Notes>
    <CVE>CVE-2023-3390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3390.html</URL>
        <Description>CVE-2023-3390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212846</URL>
        <Description>SUSE Bug 1212846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212934</URL>
        <Description>SUSE Bug 1212934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace</Note>
    </Notes>
    <CVE>CVE-2023-35001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-35001.html</URL>
        <Description>CVE-2023-35001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213059</URL>
        <Description>SUSE Bug 1213059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213063</URL>
        <Description>SUSE Bug 1213063</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

</Note>
    </Notes>
    <CVE>CVE-2023-3609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3609.html</URL>
        <Description>CVE-2023-3609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213586</URL>
        <Description>SUSE Bug 1213586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213587</URL>
        <Description>SUSE Bug 1213587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.

We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.

</Note>
    </Notes>
    <CVE>CVE-2023-3611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3611.html</URL>
        <Description>CVE-2023-3611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213585</URL>
        <Description>SUSE Bug 1213585</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2023-3812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.60.1</ProductID>
        <ProductID>openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233182-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3812.html</URL>
        <Description>CVE-2023-3812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213543</URL>
        <Description>SUSE Bug 1213543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213706</URL>
        <Description>SUSE Bug 1213706</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
