Bug 1212848

Summary: System lock up - kernel null pointer dereference - page fault
Product: [openSUSE] openSUSE Tumbleweed Reporter: David B <db>
Component: KernelAssignee: openSUSE Kernel Bugs <kernel-bugs>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: db, malted.dev, patrik.jakobsson, tiwai, tzimmermann
Version: Current   
Target Milestone: ---   
Hardware: Other   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: journal-logs
shutdown-logs.txt

Description David B 2023-06-29 08:56:40 UTC
Created attachment 867882 [details]
journal-logs

Booted up my laptop from full shutdown, logged in, Slack (Flatpak) started automatically, clicked on a few Slack channels and the system froze, couldn't switch between TTYs either. Forced shutdown with the power button.

OS: openSUSE Tumbleweed 20230624
Kernel: 6.3.9-1-default
DE: GNOME 44.2 Wayland
Laptop: Lenovo ThinkPad T14s Gen 1 (AMD 4650U with integrated graphics)

Attached some logs from the journal.
Comment 1 David B 2023-06-30 06:54:42 UTC
Yesterday I experienced it again but now when shutting down the system, GNOME had already shutdown and I just saw messages in the terminal.
Comment 2 David B 2023-06-30 06:55:30 UTC
Created attachment 867901 [details]
shutdown-logs.txt
Comment 3 Takashi Iwai 2023-07-04 07:23:38 UTC
As TW is moving to 6.4.x kernel, could you test with the latest kernel in OBS Kernel:stable repo?
Comment 4 David B 2023-07-04 07:47:20 UTC
(In reply to Takashi Iwai from comment #3)
> As TW is moving to 6.4.x kernel, could you test with the latest kernel in
> OBS Kernel:stable repo?

Ok, will see how it goes.

> uname -r
> 6.4.1-1.gb8cc951-default
Comment 5 David B 2023-07-04 13:13:24 UTC
I just experienced another lock up after using the laptop for several hours. Had to force shutdown and the system seems could print the full trace because it's not in the journal, this is all I found:

> liep. 04 16:01:11 kernel: BUG: kernel NULL pointer dereference, address: 000000000000051f
> liep. 04 16:01:11 kernel: #PF: supervisor write access in kernel mode
> liep. 04 16:01:11 kernel: #PF: error_code(0x0002) - not-present page
> liep. 04 16:01:11 kernel: PGD 0 P4D 0
> liep. 04 16:01:11 kernel: Oops: 0002 [#1] PREEMPT SMP NOPTI
> liep. 04 16:01:11 kernel: CPU: 5 PID: 3793 Comm: gnome-shell Not tainted 6.4.1-1.gb8cc951-default #1 openSUSE Tumbleweed (unreleased) 65162174696c49cc99e8e33b7df9ef2d74c390c3
> liep. 04 16:01:11 kernel: Hardware name: LENOVO 20UH002DMH/20UH002DMH, BIOS R1CET74W(1.43 ) 03/01/2023
Comment 6 Takashi Iwai 2023-07-04 13:36:52 UTC
So there seems some kernel crash, but we can't judge whether it's a similar pattern like the previous kernel, as it's cut off at the middle.

A next possibility would be to set up kdump and catch the crash log.
Comment 7 Takashi Iwai 2023-07-04 13:58:08 UTC
Also, could you try the kernel in OBS home:tiwai:kernel:stable-kasan repo?
It's a kernel with KASAN enabled, and hopefully it can catch something useful.
Note that the kernel will run a bit slower due to the overhead of KASAN.
Comment 8 David B 2023-07-04 16:56:46 UTC
(In reply to Takashi Iwai from comment #7)
> Also, could you try the kernel in OBS home:tiwai:kernel:stable-kasan repo?
> It's a kernel with KASAN enabled, and hopefully it can catch something
> useful.
> Note that the kernel will run a bit slower due to the overhead of KASAN.

I've installed your kernel, there hasn't been any freezes yet but I see one bug in dmesg

> [    9.253637] ==================================================================
> [    9.253646] BUG: KASAN: slab-out-of-bounds in amdgpu_sw_ring_ib_mark_offset+0x2c1/0x2e0 [amdgpu]
> [    9.254277] Write of size 8 at addr ffff888126db1a98 by task kworker/3:0/36
> 
> [    9.254285] CPU: 3 PID: 36 Comm: kworker/3:0 Not tainted 6.4.1-3.gb8cc951-default #1 openSUSE Tumbleweed (unreleased) 9c9f1db9bae7100475d5e6bab98f1d56aac2818e
> [    9.254294] Hardware name: LENOVO 20UH002DMH/20UH002DMH, BIOS R1CET74W(1.43 ) 03/01/2023
> [    9.254299] Workqueue: events amdgpu_device_delayed_init_work_handler [amdgpu]
> [    9.254827] Call Trace:
> [    9.254830]  <TASK>
> [    9.254833]  dump_stack_lvl+0x47/0x60
> [    9.254841]  print_report+0xcf/0x640
> [    9.254847]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
> [    9.254853]  ? amdgpu_sw_ring_ib_mark_offset+0x2c1/0x2e0 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.255391]  kasan_report+0xb1/0xe0
> [    9.255396]  ? amdgpu_sw_ring_ib_mark_offset+0x2c1/0x2e0 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.255933]  amdgpu_sw_ring_ib_mark_offset+0x2c1/0x2e0 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256469]  gfx_v9_0_ring_emit_ib_gfx+0x4cc/0xd50 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  ? amdgpu_sw_ring_ib_begin+0x1b4/0x3e0 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  amdgpu_ib_schedule+0x7cb/0x1520 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  gfx_v9_0_ring_test_ib+0x344/0x510 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  ? __pfx_gfx_v9_0_ring_test_ib+0x10/0x10 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  ? __schedule+0xc87/0x4ec0
> [    9.256953]  amdgpu_ib_ring_tests+0x2bc/0x490 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  amdgpu_device_delayed_init_work_handler+0x15/0x30 [amdgpu 9cffb4e0926e4a6d8349208c6da17c87b48a9ea2]
> [    9.256953]  process_one_work+0x76f/0x1350
> [    9.256953]  worker_thread+0xef/0x13b0
> [    9.256953]  ? __pfx_worker_thread+0x10/0x10
> [    9.256953]  kthread+0x2a3/0x370
> [    9.256953]  ? __pfx_kthread+0x10/0x10
> [    9.256953]  ret_from_fork+0x2c/0x50
> [    9.256953]  </TASK>
> 
> [    9.256953] Allocated by task 433:
> [    9.256953]  kasan_save_stack+0x20/0x40
> [    9.256953]  kasan_set_track+0x25/0x30
> [    9.256953]  __kasan_kmalloc+0xaa/0xb0
> [    9.256953]  __kmalloc+0x5e/0x160
> [    9.256953]  amdgpu_ring_mux_init+0x6e/0x1d0 [amdgpu]
> [    9.256953]  gfx_v9_0_sw_init+0xf43/0x2860 [amdgpu]
> [    9.256953]  amdgpu_device_init+0x3bbc/0x7db0 [amdgpu]
> [    9.256953]  amdgpu_driver_load_kms+0x1d/0x4b0 [amdgpu]
> [    9.256953]  amdgpu_pci_probe+0x273/0x9a0 [amdgpu]
> [    9.256953]  local_pci_probe+0xdd/0x190
> [    9.256953]  pci_device_probe+0x23a/0x770
> [    9.256953]  really_probe+0x3e2/0xb80
> [    9.256953]  __driver_probe_device+0x18c/0x450
> [    9.256953]  driver_probe_device+0x4a/0x120
> [    9.256953]  __driver_attach+0x1e1/0x4a0
> [    9.256953]  bus_for_each_dev+0xf4/0x170
> [    9.256953]  bus_add_driver+0x29e/0x570
> [    9.256953]  driver_register+0x134/0x460
> [    9.256953]  do_one_initcall+0x8e/0x310
> [    9.256953]  do_init_module+0x238/0x730
> [    9.256953]  load_module+0x5b41/0x6dd0
> [    9.256953]  __do_sys_init_module+0x1df/0x210
> [    9.256953]  do_syscall_64+0x60/0x90
> [    9.256953]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
> 
> [    9.256953] The buggy address belongs to the object at ffff888126db1a00
>                 which belongs to the cache kmalloc-128 of size 128
> [    9.256953] The buggy address is located 24 bytes to the right of
>                 allocated 128-byte region [ffff888126db1a00, ffff888126db1a80)
> 
> [    9.256953] The buggy address belongs to the physical page:
> [    9.256953] page:00000000ee84b3fa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x126db0
> [    9.256953] head:00000000ee84b3fa order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
> [    9.256953] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
> [    9.256953] page_type: 0xffffffff()
> [    9.256953] raw: 0017ffffc0010200 ffff8881000428c0 dead000000000122 0000000000000000
> [    9.256953] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
> [    9.256953] page dumped because: kasan: bad access detected
> 
> [    9.256953] Memory state around the buggy address:
> [    9.256953]  ffff888126db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [    9.256953]  ffff888126db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [    9.256953] >ffff888126db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [    9.256953]                             ^
> [    9.256953]  ffff888126db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [    9.256953]  ffff888126db1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [    9.256953] ==================================================================
> [    9.263148] Disabling lock debugging due to kernel taint
> [    9.270245] fbcon: amdgpudrmfb (fb0) is primary device
> [    9.271048] [drm] DSC precompute is not needed.
> [    9.318160] Console: switching to colour frame buffer device 240x67
> [    9.340456] amdgpu 0000:06:00.0: [drm] fb0: amdgpudrmfb frame buffer device
> [    9.691782] BTRFS: device label root devid 1 transid 4302 /dev/dm-0 scanned by (udev-worker) (568)
Comment 9 Takashi Iwai 2023-07-04 18:57:37 UTC
Thanks, this might be the cause.  It means some memory corruption.
Comment 10 Dronskowski 2023-07-04 20:27:42 UTC
Maybe introduced with 6.3.9? Stable commit 0b4e8d90f2623cc0f17d972c046b501cb84d045d and also upstream (commit 87af86ae89963c227a3beb4d914f3dc7959a690e)

Regression noted in 6.4-rc7 and patch posted:
https://lore.kernel.org/lkml/CABXGCsM5TQpnGkk7pvmrwayDytGHszYm4Vz-UgFGDMERu3UGSw@mail.gmail.com/#t

Patch submitted for 6.4.0 but not merged?
https://lore.kernel.org/lkml/CAPM=9twGy8jVci0iPwdFUpePVPf6bxmyGbTT8HxwKqdsqFCjQA@mail.gmail.com/

Haven't seen the patch upstream yet. 


I got very similar hangs with 6.3.9 and 6.4.1 on openSUSE Tumbleweed on a Lenovo Thinkpad P14s G2 with AMD Ryzen Pro 5850U and have reverted to 6.3.8 for now instead of confirming with KASAN :)
Comment 11 Dronskowski 2023-07-04 20:30:07 UTC
Sorry, wrong link.


Patch submitted for 6.4.0 but not merged? https://lore.kernel.org/lkml/20230623211808.7667-1-alexander.deucher@amd.com/
Comment 12 Takashi Iwai 2023-07-05 06:05:28 UTC
Thanks for the info.  Yes, this looks pretty much relevant, and interestingly, the whole PR isn't included in linux-next tree.  Maybe an overlook?  We need to ask Alex and Dave.

I'm building a test kernel with the backport of those patches in OBS home:tiwai:bsc1212848 repo.  It'll take some time (an hour or so) to build.
Once after the build finishes, could you try it out?
Comment 13 Dronskowski 2023-07-05 11:48:23 UTC
Thanks, I'll try it when I get home. Meanwhile reverting to 6.3.8 seems to have solved it for now as well.

A little more information: The bug was reported and confirmed on the Freedesktop Gitlab: https://gitlab.freedesktop.org/drm/amd/-/issues/2658

Reports also start piling up on Arch, Fedora etc.


bsc#1212833 seems to be a duplicate. Same symptoms, same time of appearing (6.3.9) and always with the amdgpu module loaded.
Comment 14 David B 2023-07-05 16:50:49 UTC
(In reply to Takashi Iwai from comment #12)
> Thanks for the info.  Yes, this looks pretty much relevant, and
> interestingly, the whole PR isn't included in linux-next tree.  Maybe an
> overlook?  We need to ask Alex and Dave.
> 
> I'm building a test kernel with the backport of those patches in OBS
> home:tiwai:bsc1212848 repo.  It'll take some time (an hour or so) to build.
> Once after the build finishes, could you try it out?

I've been running the patched kernel for a few hours and so far so good.

Would it make sense to have a kernel with both the patch and KASAN so we could see immediately if the memory corruption happens after booting?
Comment 15 Takashi Iwai 2023-07-05 17:59:11 UTC
OK, looks good, so far.

The patches are now merged to stable git branch for TW, and the repo in OBS Kernel:stable will be updated tomorrow (it's updated daily), followed by the automatic rebuild in my OBS home:tiwai:kernel:stable-kasan repo.
So check out the tomorrow's build.

The update to TW will happen eventually later, usually together with other updates like the upstream 6.4.x update.
Comment 17 David B 2023-07-07 13:53:07 UTC
(In reply to Takashi Iwai from comment #15)
> OK, looks good, so far.
> 
> The patches are now merged to stable git branch for TW, and the repo in OBS
> Kernel:stable will be updated tomorrow (it's updated daily), followed by the
> automatic rebuild in my OBS home:tiwai:kernel:stable-kasan repo.
> So check out the tomorrow's build.
> 
> The update to TW will happen eventually later, usually together with other
> updates like the upstream 6.4.x update.

I just wanted to confirm that I've installed 6.4.1-8.g3561b10-default from your KASAN repo yesterday evening, KASAN didn't show any memory bugs and I didn't experience any crashes or other bugs so the patches seem to have solved it.

Thank you for looking into this Takashi.
Comment 19 Takashi Iwai 2023-07-10 15:53:06 UTC
Thanks for confirmation.  The fixed kernel is on the way to TW.  Let's close now.
Comment 22 Maintenance Automation 2023-07-18 16:33:13 UTC
SUSE-SU-2023:2871-1: An update that solves 82 vulnerabilities, contains 25 features and has 390 fixes can now be installed.

Category: security (important)
Bug References: 1065729, 1109158, 1142685, 1152472, 1152489, 1155798, 1160435, 1166486, 1172073, 1174777, 1177529, 1186449, 1187829, 1189998, 1189999, 1191731, 1193629, 1194869, 1195175, 1195655, 1195921, 1196058, 1197534, 1197617, 1198101, 1198400, 1198438, 1198835, 1199304, 1199701, 1200054, 1202353, 1202633, 1203039, 1203200, 1203325, 1203331, 1203332, 1203693, 1203906, 1204356, 1204363, 1204662, 1204993, 1205153, 1205191, 1205205, 1205544, 1205650, 1205756, 1205758, 1205760, 1205762, 1205803, 1205846, 1206024, 1206036, 1206056, 1206057, 1206103, 1206224, 1206232, 1206340, 1206459, 1206492, 1206493, 1206552, 1206578, 1206640, 1206649, 1206677, 1206824, 1206843, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206887, 1206888, 1206889, 1206890, 1206891, 1206893, 1206894, 1206935, 1206992, 1207034, 1207036, 1207050, 1207051, 1207088, 1207125, 1207149, 1207158, 1207168, 1207185, 1207270, 1207315, 1207328, 1207497, 1207500, 1207501, 1207506, 1207507, 1207521, 1207553, 1207560, 1207574, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207602, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207611, 1207612, 1207613, 1207614, 1207615, 1207616, 1207617, 1207618, 1207619, 1207620, 1207621, 1207622, 1207623, 1207624, 1207625, 1207626, 1207627, 1207628, 1207629, 1207630, 1207631, 1207632, 1207633, 1207634, 1207635, 1207636, 1207637, 1207638, 1207639, 1207640, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207649, 1207650, 1207651, 1207652, 1207653, 1207734, 1207768, 1207769, 1207770, 1207771, 1207773, 1207795, 1207827, 1207842, 1207845, 1207875, 1207878, 1207933, 1207935, 1207948, 1208050, 1208076, 1208081, 1208105, 1208107, 1208128, 1208130, 1208149, 1208153, 1208183, 1208212, 1208219, 1208290, 1208368, 1208410, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208542, 1208570, 1208588, 1208598, 1208599, 1208600, 1208601, 1208602, 1208604, 1208605, 1208607, 1208619, 1208628, 1208700, 1208741, 1208758, 1208759, 1208776, 1208777, 1208784, 1208787, 1208815, 1208816, 1208829, 1208837, 1208843, 1208845, 1208848, 1208864, 1208902, 1208948, 1208976, 1209008, 1209039, 1209052, 1209092, 1209159, 1209256, 1209258, 1209262, 1209287, 1209288, 1209290, 1209291, 1209292, 1209366, 1209367, 1209436, 1209457, 1209504, 1209532, 1209556, 1209600, 1209615, 1209635, 1209636, 1209637, 1209684, 1209687, 1209693, 1209739, 1209779, 1209780, 1209788, 1209798, 1209799, 1209804, 1209805, 1209856, 1209871, 1209927, 1209980, 1209982, 1209999, 1210034, 1210050, 1210158, 1210165, 1210202, 1210203, 1210206, 1210216, 1210230, 1210294, 1210301, 1210329, 1210335, 1210336, 1210337, 1210409, 1210439, 1210449, 1210450, 1210453, 1210454, 1210498, 1210506, 1210533, 1210551, 1210565, 1210584, 1210629, 1210644, 1210647, 1210725, 1210741, 1210762, 1210763, 1210764, 1210765, 1210766, 1210767, 1210768, 1210769, 1210770, 1210771, 1210775, 1210783, 1210791, 1210793, 1210806, 1210816, 1210817, 1210827, 1210853, 1210940, 1210943, 1210947, 1210953, 1210986, 1211014, 1211025, 1211037, 1211043, 1211044, 1211089, 1211105, 1211113, 1211131, 1211205, 1211263, 1211280, 1211281, 1211299, 1211346, 1211387, 1211400, 1211410, 1211414, 1211449, 1211465, 1211519, 1211564, 1211590, 1211592, 1211593, 1211595, 1211654, 1211686, 1211687, 1211688, 1211689, 1211690, 1211691, 1211692, 1211693, 1211714, 1211794, 1211796, 1211804, 1211807, 1211808, 1211820, 1211836, 1211847, 1211852, 1211855, 1211960, 1212051, 1212129, 1212154, 1212155, 1212158, 1212265, 1212350, 1212445, 1212448, 1212456, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212685, 1212701, 1212741, 1212835, 1212838, 1212842, 1212848, 1212861, 1212869, 1212892, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134
CVE References: CVE-2022-36280, CVE-2022-38096, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-4744, CVE-2023-0045, CVE-2023-0122, CVE-2023-0179, CVE-2023-0394, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1095, CVE-2023-1118, CVE-2023-1249, CVE-2023-1382, CVE-2023-1513, CVE-2023-1582, CVE-2023-1583, CVE-2023-1611, CVE-2023-1637, CVE-2023-1652, CVE-2023-1670, CVE-2023-1829, CVE-2023-1838, CVE-2023-1855, CVE-2023-1989, CVE-2023-1998, CVE-2023-2002, CVE-2023-21102, CVE-2023-21106, CVE-2023-2124, CVE-2023-2156, CVE-2023-2162, CVE-2023-2176, CVE-2023-2235, CVE-2023-2269, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23006, CVE-2023-2430, CVE-2023-2483, CVE-2023-25012, CVE-2023-2513, CVE-2023-26545, CVE-2023-28327, CVE-2023-28410, CVE-2023-28464, CVE-2023-28866, CVE-2023-3006, CVE-2023-30456, CVE-2023-30772, CVE-2023-3090, CVE-2023-31084, CVE-2023-3111, CVE-2023-3141, CVE-2023-31436, CVE-2023-3161, CVE-2023-3212, CVE-2023-3220, CVE-2023-32233, CVE-2023-33288, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-33951, CVE-2023-33952, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829
Jira References: PED-1549, PED-3210, PED-3259, PED-3692, PED-370, PED-3750, PED-3759, PED-376, PED-3931, PED-4022, PED-835, SES-1880, SLE-18375, SLE-18377, SLE-18378, SLE-18379, SLE-18383, SLE-18384, SLE-18385, SLE-18978, SLE-18992, SLE-19001, SLE-19253, SLE-19255, SLE-19556
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-qa-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1, kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5
Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5
Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 24 Maintenance Automation 2023-07-19 20:35:00 UTC
SUSE-SU-2023:2892-1: An update that solves 15 vulnerabilities, contains one feature and has 85 fixes can now be installed.

Category: security (important)
Bug References: 1187829, 1189998, 1194869, 1205758, 1208410, 1209039, 1209780, 1210335, 1210565, 1210584, 1210853, 1211014, 1211346, 1211400, 1211410, 1211794, 1211852, 1212051, 1212265, 1212350, 1212405, 1212445, 1212448, 1212456, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212685, 1212701, 1212741, 1212835, 1212838, 1212842, 1212848, 1212861, 1212869, 1212892, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134
CVE References: CVE-2023-1249, CVE-2023-1829, CVE-2023-2430, CVE-2023-28866, CVE-2023-3090, CVE-2023-3111, CVE-2023-3212, CVE-2023-3220, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829
Jira References: PED-3931
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.6.1, kernel-source-azure-5.14.21-150500.33.6.1
Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.6.1, kernel-source-azure-5.14.21-150500.33.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Maintenance Automation 2023-08-14 08:30:16 UTC
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.