-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.1336
                   Security update for the Linux Kernel
                               3 March 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-23455 CVE-2023-23454 CVE-2022-47520
                   CVE-2022-3564 CVE-2022-3115 CVE-2022-3112

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20230591-1

Comment: CVSS (Max):  8.5 CVE-2022-47520 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for the Linux Kernel

Announcement ID:  SUSE-SU-2023:0591-1
     Rating:      important
                    o #1065729
                    o #1156395
                    o #1203740
                    o #1204614
                    o #1204989
                    o #1205496
                    o #1205601
                    o #1205695
                    o #1206073
                    o #1206344
                    o #1206393
                    o #1206399
                    o #1206515
                    o #1206602
                    o #1206634
                    o #1206635
                    o #1206636
                    o #1206637
                    o #1206640
                    o #1206641
                    o #1206642
                    o #1206643
                    o #1206644
                    o #1206645
                    o #1206646
                    o #1206647
                    o #1206648
                    o #1206649
   References:      o #1206841
                    o #1206854
                    o #1206855
                    o #1206857
                    o #1206858
                    o #1206859
                    o #1206860
                    o #1206873
                    o #1206875
                    o #1206876
                    o #1206877
                    o #1206878
                    o #1206880
                    o #1206881
                    o #1206882
                    o #1206883
                    o #1206884
                    o #1206885
                    o #1206886
                    o #1206887
                    o #1206888
                    o #1206889
                    o #1206890
                    o #1206891
                    o #1206893
                    o #1206896
                    o #1206904
                    o #1207036
                    o #1207125

                    o CVE-2022-3112
                    o CVE-2022-3115
                    o CVE-2022-3564
Cross-References:   o CVE-2022-47520
                    o CVE-2023-23454
                    o CVE-2023-23455

                    o CVE-2022-3112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2022-3112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2022-3115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2022-3115 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/
                      S:U/C:L/I:L/A:L
  CVSS scores:      o CVE-2022-47520 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N
                      /S:C/C:N/I:H/A:L
                    o CVE-2022-47520 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:N/A:H
                    o CVE-2023-23454 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-23454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-23455 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-23455 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H

                    o SUSE Linux Enterprise Micro 5.1
    Affected        o SUSE Linux Enterprise Micro 5.2
    Products:       o SUSE Linux Enterprise Micro for Rancher 5.2
                    o SUSE Linux Enterprise Real Time 15 SP3
                    o SUSE Real Time Module 15-SP3

An update that solves six vulnerabilities, contains two features and has 51
fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2022-3112: Fixed a null pointer dereference caused by lacks check of
    the return value of kzalloc() in vdec_helpers.c:amvdec_set_canvases (bsc#
    1206399).
  o CVE-2022-3115: Fixed a null pointer dereference in malidp_crtc.c caused by
    a lack of checks of the return value of kzalloc (bsc#1206393).
  o CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth
    component (bsc#1206073).
  o CVE-2022-47520: Fixed a out-of-bounds read when parsing a Robust Security
    Network (RSN) information element from a Netlink packet in the WILC1000
    wireless driver (bsc#1206515).
  o CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#
    1207036).
  o CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/
    sched/sch_atm.c because of type confusion (bsc#1207125).

The following non-security bugs were fixed:

  o arm64: cpu_errata: Add Hisilicon TSV110 to spectre-v2 safe list (git-fixes)
  o arm64: dts: allwinner: H5: Add PMU node (git-fixes)
  o arm64: dts: allwinner: H6: Add PMU mode (git-fixes)
  o arm64: dts: marvell: Add AP806-dual missing CPU clocks (git-fixes)
  o arm64: dts: rockchip: Fix NanoPC-T4 cooling maps (git-fixes)
  o arm64: dts: rockchip: add reg property to brcmf sub-nodes (git-fixes)
  o arm64: dts: rockchip: fix dwmmc clock name for px30 (git-fixes)
  o arm64: memory: Add missing brackets to untagged_addr() macro (git-fixes)
  o arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes).
  o arm64: tags: Preserve tags for addresses translated via TTBR1 (git-fixes)
  o arm64: tegra: Fix 'active-low' warning for Jetson Xavier regulator
    (git-fixes)
  o btrfs: Avoid unnecessary lock and leaf splits when up (bsc#1206904).
  o drbd: destroy workqueue when drbd device was freed (git-fixes).
  o drbd: remove usage of list iterator variable after loop (git-fixes).
  o drbd: use after free in drbd_create_device() (git-fixes).
  o ext4: Detect already used quota file early (bsc#1206873).
  o ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
  o ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
  o ext4: avoid crash when inline data creation follows DIO write (bsc#
    1206883).
  o ext4: avoid race conditions when remounting with options that change dax
    (bsc#1206860).
  o ext4: avoid resizing to a partial cluster size (bsc#1206880).
  o ext4: choose hardlimit when softlimit is larger than hardlimit in
    ext4_statfs_project() (bsc#1206854).
  o ext4: continue to expand file system when the target size does not reach
    (bsc#1206882).
  o ext4: convert BUG_ON's to WARN_ON's in mballoc.c (bsc#1206859).
  o ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
  o ext4: correct the error path of ext4_write_inline_data_end() (bsc#1206875).
  o ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
  o ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
  o ext4: fix a data race at inode->i_disksize (bsc#1206855).
  o ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc
    #1206881).
  o ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
  o ext4: fix extent status tree race in writeback error recovery path (bsc#
    1206877).
  o ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
  o ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#
    1206890).
  o ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
  o ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
  o ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
  o ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
  o ext4: iomap that extends beyond EOF should be marked dirty (bsc#1206637).
  o ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
  o ext4: mark block bitmap corrupted when found instead of BUGON (bsc#
    1206857).
  o ext4: silence the warning when evicting inode with dioread_nolock (bsc#
    1206889).
  o ext4: update s_overhead_clusters in the superblock during an on-line resize
    (bsc#1206876).
  o ext4: use matching invalidatepage in ext4_writepage (bsc#1206858).
  o fs: nfsd: fix kconfig dependency warning for NFSD_V4 (git-fixes).
  o ibmveth: Always stop tx queues during close (bsc#1065729).
  o isofs: joliet: Fix iocharset=utf8 mount option (bsc#1206636).
  o lib/notifier-error-inject: fix error when writing -errno to debugfs file
    (bsc#1206634).
  o libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (bsc#1206634).
  o lockd: lockd server-side shouldn't set fl_ops (git-fixes).
  o memcg, kmem: further deprecate kmem.limit_in_bytes (bsc#1206896).
  o memcg: Fix possible use-after-free in memcg_write_event_control() (bsc#
    1206344).
  o mm, memcg: do not high throttle allocators based on wraparound
  o mm, memcg: fix corruption on 64-bit divisor in memory.high throttling
  o mm, memcg: throttle allocators based on ancestral memory.high
  o mm/filemap.c: clear page error before actual read (bsc#1206635).
  o mm: fix race between MADV_FREE reclaim and blkdev direct IO read (bsc#
    1204989,bsc#1205601).
  o module: Remove accidental change of module_enable_x() (git-fixes).
  o module: avoid goto s in module_sig_check() (git-fixes).
  o module: merge repetitive strings in module_sig_check() (git-fixes).
  o module: set MODULE_STATE_GOING state when a module fails to load
    (git-fixes).
  o modules: lockdep: Suppress suspicious RCU usage warning (git-fixes).
  o net: sched: atm: dont intepret cls results when asked to drop (bsc#
    1207036).
  o net: sched: cbq: dont intepret cls results when asked to drop (bsc#
    1207036).
  o net: sunrpc: Fix off-by-one issues in 'rpc_ntop6' (git-fixes).
  o netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() (bsc#
    1204614).
  o nfs4: Fix kmemleak when allocate slot failed (git-fixes).
  o nfs4: Fix oops when copy_file_range is attempted with NFS4.0 source
    (git-fixes).
  o nfs: Fix an Oops in nfs_d_automount() (git-fixes).
  o nfs: Fix memory leaks (git-fixes).
  o nfs: Fix memory leaks in nfs_pageio_stop_mirroring() (git-fixes).
  o nfs: Handle missing attributes in OPEN reply (bsc#1203740).
  o nfs: Zero-stateid SETATTR should first return delegation (git-fixes).
  o nfs: direct.c: Fix memory leak of dreq when nfs_get_lock_context fails
    (git-fixes).
  o nfs: fix PNFS_FLEXFILE_LAYOUT Kconfig default (git-fixes).
  o nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
  o nfs: nfs_find_open_context() may only select open files (git-fixes).
  o nfs: nfs_xdr_status should record the procedure name (git-fixes).
  o nfs: we do not support removing system.nfs4_acl (git-fixes).
  o nfsd: Clone should commit src file metadata too (git-fixes).
  o nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
  o nfsd: Fix svc_xprt refcnt leak when setup callback client failed
    (git-fixes).
  o nfsd: Keep existing listeners on portlist error (git-fixes).
  o nfsd: Return nfserr_serverfault if splice_ok but buf->pages have data
    (git-fixes).
  o nfsd: do not call nfsd_file_put from client states seqfile display
    (git-fixes).
  o nfsd: fix error handling in NFSv4.0 callbacks (git-fixes).
  o nfsd: safer handling of corrupted c_type (git-fixes).
  o nfsv4 expose nfs_parse_server_name function (git-fixes).
  o nfsv4 only print the label when its queried (git-fixes).
  o nfsv4 remove zero number of fs_locations entries error check (git-fixes).
  o nfsv4.1 handle ERR_DELAY error reclaiming locking state on delegation
    recall (git-fixes).
  o nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
  o nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
  o nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
  o nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
  o nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
  o nfsv4.2: Fix initialisation of struct nfs4_label (git-fixes).
  o nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
  o nfsv4.2: error out when relink swapfile (git-fixes).
  o nfsv4.x: Fail client initialisation if state manager thread can't run
    (git-fixes).
  o nfsv4/pnfs: Always return layout stats on layout return for flexfiles
    (git-fixes).
  o nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
  o nfsv4: Do not hold the layoutget locks across multiple RPC calls
    (git-fixes).
  o nfsv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn
    (git-fixes).
  o nfsv4: Fix a pNFS layout related use-after-free race when freeing the inode
    (git-fixes).
  o nfsv4: Fix races between open and dentry revalidation (git-fixes).
  o nfsv4: Protect the state recovery thread against direct reclaim
    (git-fixes).
  o nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
  o pnfs/nfsv4: Try to return invalid layout in pnfs_layout_process()
    (git-fixes).
  o powerpc/64: Init jump labels before parse_early_param() (bsc#1065729).
  o powerpc/64s/pgtable: fix an undefined behaviour (bsc#1065729).
  o powerpc/book3s/mm: Update Oops message to print the correct translation in
    use (bsc#1156395).
  o powerpc/boot: Fixup device-tree on little endian (bsc#1065729).
  o powerpc/crashkernel: Take "mem=" option into account (bsc#1065729).
  o powerpc/eeh: Only dump stack once if an MMIO loop is detected (bsc#
    1065729).
  o powerpc/pci: Fix get_phb_number() locking (bsc#1065729).
  o powerpc/perf: callchain validate kernel stack pointer bounds (bsc#1065729).
  o powerpc/powernv/iov: Ensure the pdn for VFs always contains a valid PE
    number (bsc#1065729).
  o powerpc/powernv/smp: Fix spurious DBG() warning (bsc#1065729).
  o powerpc/powernv: Avoid re-registration of imc debugfs directory (bsc#
    1156395).
  o powerpc/powernv: add missing of_node_put (bsc#1065729).
  o powerpc/pseries/cmm: Implement release() function for sysfs device (bsc#
    1065729).
  o powerpc/pseries/eeh: use correct API for error log size (bsc#1065729).
  o powerpc/pseries: Stop calling printk in rtas_stop_self() (bsc#1065729).
  o powerpc/pseries: unregister VPA when hot unplugging a CPU (bsc#1205695 ltc#
    200603).
  o powerpc/rtas: avoid device tree lookups in rtas_os_term() (bsc#1065729).
  o powerpc/rtas: avoid scheduling in rtas_os_term() (bsc#1065729).
  o powerpc/sriov: Remove VF eeh_dev state when disabling SR-IOV (bsc#1065729).
  o powerpc/xive/spapr: correct bitmap allocation size (git-fixes).
  o powerpc/xive: Add a check for memory allocation failure (git-fixes).
  o powerpc/xive: add missing iounmap() in error path in
    xive_spapr_populate_irq_data() (git-fixes).
  o powerpc: Ensure that swiotlb buffer is allocated from low memory (bsc#
    1156395).
  o powerpc: Force inlining of cpu_has_feature() to avoid build failure (bsc#
    1065729).
  o powerpc: improve handling of unrecoverable system reset (bsc#1065729).
  o powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe() (bsc#
    1065729).
  o quota: Check next/prev free block number after reading from quota file (bsc
    #1206640).
  o rpc: fix NULL dereference on kmalloc failure (git-fixes).
  o rpc: fix gss_svc_init cleanup on failure (git-fixes).
  o sbitmap: fix lockup while swapping (bsc#1206602).
  o sched/psi: Fix sampling error and rare div0 crashes with cgroups and high
    uptime (bsc#1206841).
  o scsi: lpfc: Correct bandwidth logging during receipt of congestion sync
    WCQE (jsc#PED-1445).
  o scsi: lpfc: Fix MI capability display in cmf_info sysfs attribute (jsc#
    PED-1445).
  o scsi: lpfc: Fix WQ|CQ|EQ resource check (jsc#PED-1445).
  o scsi: lpfc: Fix crash involving race between FLOGI timeout and devloss
    handler (jsc#PED-1445).
  o scsi: lpfc: Remove linux/msi.h include (jsc#PED-1445).
  o scsi: lpfc: Remove redundant pointer 'lp' (jsc#PED-1445).
  o scsi: lpfc: Update lpfc version to 14.2.0.9 (jsc#PED-1445).
  o scsi: lpfc: Use memset_startat() helper (jsc#PED-1445).
  o scsi: qla2xxx: Fix crash when I/O abort times out (jsc#PED-568).
  o scsi: qla2xxx: Fix set-but-not-used variable warnings (jsc#PED-568).
  o scsi: qla2xxx: Initialize vha->unknown_atio_[list, work] for NPIV hosts
    (jsc#PED-568).
  o scsi: qla2xxx: Remove duplicate of vha->iocb_work initialization (jsc#
    PED-568).
  o scsi: qla2xxx: Remove unused variable 'found_devs' (jsc#PED-568).
  o string.h: Introduce memset_startat() for wiping trailing members and
    padding (jsc#PED-1445).
  o sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails
    (git-fixes).
  o sunrpc: Do not start a timer on an already queued rpc task (git-fixes).
  o sunrpc: Fix missing release socket in rpc_sockname() (git-fixes).
  o sunrpc: Fix potential leaks in sunrpc_cache_unhash() (git-fixes).
  o sunrpc: Fix socket waits for write buffer space (git-fixes).
  o sunrpc: Handle 0 length opaque XDR object data properly (git-fixes).
  o sunrpc: Mitigate cond_resched() in xprt_transmit() (git-fixes).
  o sunrpc: Move simple_get_bytes and simple_get_netobj into private header
    (git-fixes).
  o sunrpc: check that domain table is empty at module unload (git-fixes).
  o sunrpc: stop printk reading past end of string (git-fixes).
  o svcrdma: Fix another Receive buffer leak (git-fixes).
  o svcrdma: Fix backchannel return code (git-fixes).
  o tracing: Verify if trace array exists before destroying it (git-fixes).
  o udf: Avoid accessing uninitialized data on failed inode read (bsc#1206642).
  o udf: Fix NULL pointer dereference in udf_symlink function (bsc#1206646).
  o udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
  o udf: Fix free space reporting for metadata and virtual partitions (bsc#
    1206641).
  o udf: Fix iocharset=utf8 mount option (bsc#1206647).
  o udf: Limit sparing table size (bsc#1206643).
  o udf: fix silent AED tagLocation corruption (bsc#1206645).
  o udf: fix the problem that the disc content is not displayed (bsc#1206644).
  o udf_get_extendedattr() had no boundary checks (bsc#1206648).
  o xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
  o xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).

Special Instructions and Notes:

  o Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Real Time Module 15-SP3
    zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2023-591=1
  o SUSE Linux Enterprise Micro 5.1
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-591=1
  o SUSE Linux Enterprise Micro 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1
  o SUSE Linux Enterprise Micro for Rancher 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1

Package List:

  o SUSE Real Time Module 15-SP3 (x86_64)
       kernel-syms-rt-5.3.18-150300.118.1
       kernel-rt_debug-devel-debuginfo-5.3.18-150300.118.1
       cluster-md-kmp-rt-5.3.18-150300.118.1
       kernel-rt_debug-debugsource-5.3.18-150300.118.1
       gfs2-kmp-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-debuginfo-5.3.18-150300.118.1
       dlm-kmp-rt-debuginfo-5.3.18-150300.118.1
       dlm-kmp-rt-5.3.18-150300.118.1
       kernel-rt-devel-debuginfo-5.3.18-150300.118.1
       kernel-rt_debug-devel-5.3.18-150300.118.1
       gfs2-kmp-rt-5.3.18-150300.118.1
       cluster-md-kmp-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-debugsource-5.3.18-150300.118.1
       ocfs2-kmp-rt-5.3.18-150300.118.1
       kernel-rt_debug-debuginfo-5.3.18-150300.118.1
       ocfs2-kmp-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-devel-5.3.18-150300.118.1
  o SUSE Real Time Module 15-SP3 (noarch)
       kernel-devel-rt-5.3.18-150300.118.1
       kernel-source-rt-5.3.18-150300.118.1
  o SUSE Real Time Module 15-SP3 (nosrc x86_64)
       kernel-rt-5.3.18-150300.118.1
  o SUSE Real Time Module 15-SP3 (nosrc)
       kernel-rt_debug-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
       kernel-rt-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro 5.1 (x86_64)
       kernel-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-debugsource-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
       kernel-rt-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro 5.2 (x86_64)
       kernel-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-debugsource-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
       kernel-rt-5.3.18-150300.118.1
  o SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
       kernel-rt-debuginfo-5.3.18-150300.118.1
       kernel-rt-debugsource-5.3.18-150300.118.1

References:

  o https://www.suse.com/security/cve/CVE-2022-3112.html
  o https://www.suse.com/security/cve/CVE-2022-3115.html
  o https://www.suse.com/security/cve/CVE-2022-3564.html
  o https://www.suse.com/security/cve/CVE-2022-47520.html
  o https://www.suse.com/security/cve/CVE-2023-23454.html
  o https://www.suse.com/security/cve/CVE-2023-23455.html
  o https://bugzilla.suse.com/show_bug.cgiid=1065729
  o https://bugzilla.suse.com/show_bug.cgiid=1156395
  o https://bugzilla.suse.com/show_bug.cgiid=1203740
  o https://bugzilla.suse.com/show_bug.cgiid=1204614
  o https://bugzilla.suse.com/show_bug.cgiid=1204989
  o https://bugzilla.suse.com/show_bug.cgiid=1205496
  o https://bugzilla.suse.com/show_bug.cgiid=1205601
  o https://bugzilla.suse.com/show_bug.cgiid=1205695
  o https://bugzilla.suse.com/show_bug.cgiid=1206073
  o https://bugzilla.suse.com/show_bug.cgiid=1206344
  o https://bugzilla.suse.com/show_bug.cgiid=1206393
  o https://bugzilla.suse.com/show_bug.cgiid=1206399
  o https://bugzilla.suse.com/show_bug.cgiid=1206515
  o https://bugzilla.suse.com/show_bug.cgiid=1206602
  o https://bugzilla.suse.com/show_bug.cgiid=1206634
  o https://bugzilla.suse.com/show_bug.cgiid=1206635
  o https://bugzilla.suse.com/show_bug.cgiid=1206636
  o https://bugzilla.suse.com/show_bug.cgiid=1206637
  o https://bugzilla.suse.com/show_bug.cgiid=1206640
  o https://bugzilla.suse.com/show_bug.cgiid=1206641
  o https://bugzilla.suse.com/show_bug.cgiid=1206642
  o https://bugzilla.suse.com/show_bug.cgiid=1206643
  o https://bugzilla.suse.com/show_bug.cgiid=1206644
  o https://bugzilla.suse.com/show_bug.cgiid=1206645
  o https://bugzilla.suse.com/show_bug.cgiid=1206646
  o https://bugzilla.suse.com/show_bug.cgiid=1206647
  o https://bugzilla.suse.com/show_bug.cgiid=1206648
  o https://bugzilla.suse.com/show_bug.cgiid=1206649
  o https://bugzilla.suse.com/show_bug.cgiid=1206841
  o https://bugzilla.suse.com/show_bug.cgiid=1206854
  o https://bugzilla.suse.com/show_bug.cgiid=1206855
  o https://bugzilla.suse.com/show_bug.cgiid=1206857
  o https://bugzilla.suse.com/show_bug.cgiid=1206858
  o https://bugzilla.suse.com/show_bug.cgiid=1206859
  o https://bugzilla.suse.com/show_bug.cgiid=1206860
  o https://bugzilla.suse.com/show_bug.cgiid=1206873
  o https://bugzilla.suse.com/show_bug.cgiid=1206875
  o https://bugzilla.suse.com/show_bug.cgiid=1206876
  o https://bugzilla.suse.com/show_bug.cgiid=1206877
  o https://bugzilla.suse.com/show_bug.cgiid=1206878
  o https://bugzilla.suse.com/show_bug.cgiid=1206880
  o https://bugzilla.suse.com/show_bug.cgiid=1206881
  o https://bugzilla.suse.com/show_bug.cgiid=1206882
  o https://bugzilla.suse.com/show_bug.cgiid=1206883
  o https://bugzilla.suse.com/show_bug.cgiid=1206884
  o https://bugzilla.suse.com/show_bug.cgiid=1206885
  o https://bugzilla.suse.com/show_bug.cgiid=1206886
  o https://bugzilla.suse.com/show_bug.cgiid=1206887
  o https://bugzilla.suse.com/show_bug.cgiid=1206888
  o https://bugzilla.suse.com/show_bug.cgiid=1206889
  o https://bugzilla.suse.com/show_bug.cgiid=1206890
  o https://bugzilla.suse.com/show_bug.cgiid=1206891
  o https://bugzilla.suse.com/show_bug.cgiid=1206893
  o https://bugzilla.suse.com/show_bug.cgiid=1206896
  o https://bugzilla.suse.com/show_bug.cgiid=1206904
  o https://bugzilla.suse.com/show_bug.cgiid=1207036
  o https://bugzilla.suse.com/show_bug.cgiid=1207125
  o https://jira.suse.com/browse/PED-1445
  o https://jira.suse.com/browse/PED-568

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=/4KJ
-----END PGP SIGNATURE-----