Bug 1213304 - Displays Crash After Logging Into System
Summary: Displays Crash After Logging Into System
Status: RESOLVED FIXED
Alias: None
Product: PUBLIC SUSE Linux Enterprise Desktop 15 SP4
Classification: openSUSE
Component: Kernel (show other bugs)
Version: SLES15SP4-MaintUpd
Hardware: x86-64 openSUSE Leap 15.4
: P5 - None : Major
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-14 00:17 UTC by Tim Barber
Modified: 2024-06-25 17:50 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
dmesg output (77.61 KB, text/x-log)
2023-07-19 21:00 UTC, Tim Barber
Details
hwinfo output (1.00 MB, text/x-log)
2023-07-19 21:02 UTC, Tim Barber
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Barber 2023-07-14 00:17:11 UTC
Please excuse me if I am not entering this bug correctly because this is the first time I have ever experienced any issues. I chose Basesystem because the issue affects all display systems.

After upgrading to kernel 5.14.21-150400.25.69 from 5.14.21-150400.25.66, I have one display simply show the color green and my second monitor stays blank. I have tried different desktops under both X11 & Wayland with no luck. I am assuming it is something in the kernel because when I go back to the .66 kernel, my system works as it should.

This is repeatable 100% on my system. I am running an ASRock motherboard with AMD A12-9800 CPU with a Radeon R7 card. I am not sure what logs to capture to help so some guidance would be appreciated.

I have booted to init 3 in hopes to look through logs, but once I run startx, my system is basically dead and can't recover without a hard reset.
Comment 1 Tim Barber 2023-07-14 01:18:47 UTC
Ran the inxi command with the good kernel to give better hardware/software setup:
System:    Kernel: 5.14.21-150400.24.66-default x86_64 bits: 64 compiler: gcc v: 7.5.0
           parameters: BOOT_IMAGE=/boot/vmlinuz-5.14.21-150400.24.66-default root=UUID=b8ed1fe8-6d85-4e7e-8e54-5446a967373e
           showopts quiet mitigations=off
           Desktop: KDE Plasma 5.24.4 tk: Qt 5.15.2 wm: kwin_wayland vt: 2 dm: SDDM Distro: openSUSE Leap 15.4
Graphics:  Device-1: Advanced Micro Devices [AMD/ATI] Wani [Radeon R5/R6/R7 Graphics] driver: amdgpu v: kernel bus-ID: 00:01.0
           chip-ID: 1002:9874 class-ID: 0300
           Device-2: Logitech HD Pro Webcam C920 type: USB driver: snd-usb-audio,uvcvideo bus-ID: 2-4:5 chip-ID: 046d:082d
           class-ID: 0102 serial: <filter>
           Display: wayland server: SUSE LINUX 1.20.3 compositor: kwin_wayland driver: loaded: amdgpu,ati
           unloaded: fbdev,modesetting,vesa display-ID: :1 screens: 1
           Screen-1: 0 s-res: 3840x1080 s-dpi: 96 s-size: 1016x286mm (40.0x11.3") s-diag: 1055mm (41.6")
           Monitor-1: XWAYLAND0 res: 1920x1080 hz: 60 dpi: 92 size: 530x300mm (20.9x11.8") diag: 609mm (24")
           Monitor-2: XWAYLAND1 res: 1920x1080 hz: 60 dpi: 92 size: 530x300mm (20.9x11.8") diag: 609mm (24")
           OpenGL: renderer: AMD CARRIZO (DRM 3.42.0 5.14.21-150400.24.66-default LLVM 11.0.1) v: 4.6 Mesa 21.2.4
           direct render: Yes

I looked over the output of dmesg with the .69 kernel, and I am not seeing any errors to my untrained eye.
Comment 2 Takashi Iwai 2023-07-14 07:16:09 UTC
If it's a problem of AMDGPU driver, you can try to take the old good-working kernel module onto the new kernel, e.g.

  % mkdir /lib/modules/5.14.21-150400.25.69/updates
  % cp /lib/modules/5.14.21-150400.25.66-default/kernel/drivers/gpu/drm/amd/amdgpu.ko.zst /lib/modules/5.14.21-150400.25.69-default/updates/
  % depmod 5.14.21-150400.25.69-default
  % dracut -f --kver 5.14.21-150400.25.69-default

Then retest.
Comment 3 Tim Barber 2023-07-18 17:17:31 UTC
Performed the above, and I am still experiencing the same issue where the display server is crashing and leaving one screen fully green and the second blank.
Comment 4 Tim Barber 2023-07-18 17:36:06 UTC
I just looked over the files in my /boot directory, and no files were changed from the above actions. Should something have changed? Did I do something incorrectly?
Comment 5 Tim Barber 2023-07-18 19:52:45 UTC
Did some investigation here and noticed that there was a file in the directory where I ran the dracut command named kver. I also noticed that the size of the file is approximately the same size (off by a few hundred bytes or so) as the initrd files in /boot. I took a stab and renamed the kver file to /boot/initrd-5.14.21-150400.24.69-default and rebooted. The results were the display server does not crash and I have a working desktop in both KDE Wayland & X11.
Comment 6 Takashi Iwai 2023-07-19 07:34:45 UTC
OK, so it means that replacing the amdgpu from the older kernel worked?
Then please give the dmesg output and the hwinfo output.  Attach them to Bugzilla.

The next thing is to check whether the problem happens with the build from the very latest SLE15-SP4 kernel git branch.  The kernel package is found in OBS Kernel:SLE15-SP4 repo:
  http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/

Download kernel-default.rpm, kernel-default-extra.rpm and kernel-default-optional.rpm and install them via "zypper install".  You might need to pass --oldpackage option.  Ignore the warnings about keys, etc.

Note that it's an unofficial build, hence you need to turn off Secure Boot.
Comment 7 Tim Barber 2023-07-19 21:00:24 UTC
Created attachment 868332 [details]
dmesg output

Output of dmesg with the offending amdgpu driver.
Comment 8 Tim Barber 2023-07-19 21:02:11 UTC
Created attachment 868333 [details]
hwinfo output

Attached is the output from hwinfo with the offending amdgpu driver loaded.
Comment 9 Tim Barber 2023-07-19 21:03:24 UTC
Before I attempt to load the latest kernel rpm's, how can I make changes to guarantee that I don't loose access to the .66 kernel? Asking because this is my primary workstation that I must be able to use during the day.
Comment 10 Takashi Iwai 2023-07-20 05:41:00 UTC
You can add "lock" by zypper, e.g. something like:
  zypper addlock kernel-default-5.14.21-150400.25.66

The lock can be removed by zypper removelock $PKG-$VERSION, too.

In addition, try to increase the number of installable kernels by editing /etc/zypp/zypp.conf.  Modify the line defining multiversion.kernels to put more entries, e.g.
  multiversion.kernels = latest,latest-1,latest-2,latest-3,running
Comment 11 Takashi Iwai 2023-07-20 06:00:11 UTC
Supposing that the latest SLE15-SP4 kernel still causes the problem, I built a few test kernels for performing a la bisect.

Once after confirming that the latest SLE15-SP4 kernel is broken, try to test another one in OBS home:tiwai:bsc1213304-1 repo:
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-1/pool/

If this one *works*:
- Try another one in OBS home:tiwai:bsc1213304-2 repo:
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-2/pool/

Or if *-1 kernel failed:
- Try the kernel in OBS home:tiwai:bsc1213304-3 repo:
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-3/pool/
Comment 12 Tim Barber 2023-07-24 21:38:41 UTC
My apologizes for not letting you know that I was going to be on vacation for a week. I will try to get to this ASAP.
Comment 13 Jiri Wiesner 2023-07-31 08:47:40 UTC
Hello, Tim. I can reproduce the issue on my desktop machine at home. I have already run tests with the kernels in comment 11, see bug 1213777 comment 3 for the results. It will hopefully allow us to identify the problematic commit soon.
Comment 14 Tim Barber 2023-07-31 12:00:15 UTC
Hi Jiri,
My apologizes for not getting to this sooner, but I was pulled out of the country on work so I haven't been by my workstation to work through the test kernels.
Comment 15 Takashi Iwai 2023-08-02 11:54:05 UTC
The issue Jiri faced was already fixed in the latest SLE15-SP4 git branch, and the fix will be likely included in the next update in August.

So, please check the latest OBS Kernel:SLE15-SP4 kernel (or the update in August) once when you have time.  I hope it's the same issue and should be fixed there.
Comment 21 Tim Barber 2023-08-04 12:36:36 UTC
My apologizes, but I still have not had the opportunity to test this. My client has requested further work which keeps me out of the country.
Comment 24 Tim Barber 2023-08-05 17:45:23 UTC
I just installed the latest update (5.14.21-150400.24.74), and I am still experiencing the issue. Based upon the bug 1213777, I was kinda expecting the fix to be the latest update maybe just too soon.
Comment 28 Jiri Wiesner 2023-08-07 07:35:22 UTC
(In reply to Tim Barber from comment #24)
> I just installed the latest update (5.14.21-150400.24.74), and I am still
> experiencing the issue. Based upon the bug 1213777, I was kinda expecting
> the fix to be the latest update maybe just too soon.
There was an out-of-band kernel update in July to fix the Zenbleed vulnerability. Kernel 5.14.21-150400.24.74 is that late July update. It had to be done - every day counts when it comes to vulnerabilities.

The actual August kernel update, which contains the fix, is still in the pipeline. The release date was set to 8th Aug. I not sure if the kernel will be really released tomorrow but it can be expected soon. If you wanted something to test immediately the latest OBS Kernel:SLE15-SP4 kernel is available. It is a development release, meaning no QA testing has been carried out on it. The kernel package is found in OBS Kernel:SLE15-SP4 repo:
  http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/
Comment 29 Tim Barber 2023-08-07 23:36:49 UTC
Hi Jiri,

Please excuse what might be simple questions, but I am quite new to reporting bugs and having to install these test builds. I have been using OPENSUSE for 8 years, and this is the first time have had a bug like this.

I have locked my .66 kernel and added entries to the zypp.conf file as suggested below. I have also downloaded the following files

1. kernel-default-5.14.21-150400.480.1.g6d64757.x86_64.rpm
2. kernel-default-extra-5.14.21-150400.480.1.g6d64757.x86_64.rpm
3. kernel-default-optional-5.14.21-150400.480.1.g6d64757.x86_64.rpm

From http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/

Is the next step simply installing the above files with zypper? If so, is there a specific order?

Thanks,

Tim
Comment 30 Takashi Iwai 2023-08-08 06:51:37 UTC
Yes, just install those packages with zypper install --oldpackage option, and boot with that kernel.

But as Jiri pointed, you can wait just for a while until the proper update kernel gets released, too.
Comment 31 Jiri Wiesner 2023-08-08 08:17:27 UTC
I will list the commands explicitly. After you have downloaded the packages yourself, use one of these commands:
> zypper install --oldpackage kernel-default*
> rpm -ivh kernel-default*
> rpm -ivh --force --nodeps kernel-default*
The order is not important as long as all the packages are installed with a single command. For long term use (not your case), one usually adds a repository:
> zypper ar http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/Kernel:SLE15-SP4.repo
> zypper ref
> zypper se -s kernel-default
> zypper in kernel-default-5.14.21-150400.480.1.g6d64757
Comment 41 Maintenance Automation 2023-08-14 08:30:29 UTC
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 42 Maintenance Automation 2023-08-14 16:30:17 UTC
SUSE-SU-2023:3313-1: An update that solves 13 vulnerabilities and has 20 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213585, 1213586, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213842, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004
Sources used:
SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-source-5.14.21-150400.24.81.1
Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.81.1, kernel-syms-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3
openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.81.1, kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-syms-5.14.21-150400.24.81.1, kernel-source-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1, kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3
openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
openSUSE Leap Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 43 Maintenance Automation 2023-08-14 16:30:32 UTC
SUSE-SU-2023:3311-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-5.14.21-150500.55.19.1, kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4, kernel-source-5.14.21-150500.55.19.1, kernel-obs-qa-5.14.21-150500.55.19.1, kernel-obs-build-5.14.21-150500.55.19.1
Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-source-5.14.21-150500.55.19.1
Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.19.1, kernel-syms-5.14.21-150500.55.19.1, kernel-source-5.14.21-150500.55.19.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 44 Tim Barber 2023-08-15 00:32:27 UTC
I was able to install vmlinuz-5.14.21-150400.487.gd86b205-default version from the pool, and it corrects my issue I was having with vmlinuz-5.14.21-150400.24.69-default & vmlinuz-5.14.21-150400.24.74-default. I apologize for taking so long, but I had to practice the installation on a test VM because I have never done this before, and I really did not want to bork my workstation. Thanks a ton for all the help, I do appreciate just how fast all responded to my issue.
Comment 45 Maintenance Automation 2023-08-15 12:30:24 UTC
SUSE-SU-2023:3318-1: An update that solves 20 vulnerabilities and has 89 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1206418, 1207129, 1207894, 1208788, 1210565, 1210584, 1210627, 1210780, 1210853, 1211131, 1211243, 1211738, 1211811, 1211867, 1212301, 1212502, 1212604, 1212846, 1212901, 1212905, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213134, 1213167, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213523, 1213524, 1213543, 1213585, 1213586, 1213588, 1213620, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2985, CVE-2023-31083, CVE-2023-3117, CVE-2023-31248, CVE-2023-3268, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-4004
Sources used:
openSUSE Leap 15.4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_11-1-150400.1.5.1
SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 46 Maintenance Automation 2023-08-22 16:30:07 UTC
SUSE-SU-2023:3376-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1
Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 47 Tim Barber 2023-08-22 20:05:23 UTC
I have an odd question. Am I responsible for changed the Status of this bug from IN_PROGRESS to RESOLVED now that the latest kernel (5.14.21-150400.24.81-default) fixes the issue?
Comment 48 Maintenance Automation 2023-08-22 20:30:16 UTC
SUSE-SU-2023:3377-1: An update that solves 11 vulnerabilities and has 19 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3776, CVE-2023-4004
Sources used:
openSUSE Leap 15.4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1
Public Cloud Module 15-SP4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 49 Takashi Iwai 2023-08-23 06:27:32 UTC
You need to clear NEEDINFO flag that was set to you after you provide the info.
The rest is our job :)
Comment 50 Tim Barber 2023-08-23 23:32:49 UTC
It appears that flag was cleared or am I missing something?
Comment 51 Takashi Iwai 2023-08-24 05:08:09 UTC
Yes, I already removed it before closing.