Bugzilla – Bug 1214052
VUL-0: CVE-2023-4039: gcc: stack protector does not protect C99 VLAs on Aarch64
Last modified: 2024-02-27 12:41:52 UTC
I have had a look at the set of patches from ARM and they are somewhat difficult to backport as they mangle some cleanup as prerequesite and we have to backport across a major refactoring in the backend (SVE support which had wide-spread effects). I didn't look whether backporting to GCC 4.8 is even remotely reasonable, I have trouble finding the context of first few relevant hunks already. So - a backport to GCC 7 looks feasible but difficult, in particular difficult to validate. The latter in particular to validate we don't break existing code, validating the fix works as expected might be possible via the provided testcases though they do 1:1 matching of generated code which is likely going to need adjustments as well. A backport to GCC 4.8 doesn't look sensible, aarch64 support is fragile enough there. I don't think meeting the Aug-28th deadline for a fix + QA is reasonable and as repeatedly said fixing the compiler fixes nothing. I'll ask around if anybody did backports to earlier than GCC 11.
(In reply to Richard Biener from comment #12) > I don't think meeting the Aug-28th deadline for a fix + QA is reasonable and > as repeatedly said fixing the compiler fixes nothing. We'd be happy having the fix everywhere possible by the CRD deadline anyway, so that we can start rebuilding packages once the issue is public.
(In reply to Carlos López from comment #13) > (In reply to Richard Biener from comment #12) > > I don't think meeting the Aug-28th deadline for a fix + QA is reasonable and > > as repeatedly said fixing the compiler fixes nothing. > > We'd be happy having the fix everywhere possible by the CRD deadline anyway, > so that we can start rebuilding packages once the issue is public. OK, I have reached out to ARM and they provided me with a backport for GCC 7, GCC 4.8 seems out of reach though. I will get updates for GCC 12 (the current Toolchain module compiler + the system runtime libraries) ready and then handle GCC 7 which is also present in SLE12, I would then suggest to re-build affected packages with GCC 7 instead of GCC 4.8. I'll note that GCC 4.8 for aarch64 isn't supported for our customers but they have to resort to the toolchain module compiler for that architecture on SLE12.
GCC 11 is no longer maintained, it might be still used to build packages in SLE12/15 (Firefox or other packages requiring support for recent C++ standards are susceptible), packages using GCC 11 or older (and not GCC 7) should move to use GCC 12 when they are updated the next time. openSUSE Leap will get both GCC 7 and GCC 12 from the SLE updates. I will update openSUSE Factory once the issue is public. openSUSE Factory has gcc7, gcc12 and gcc13. Patched gcc7 and gcc12 are now building, I will assess whether the fix is working based on the testresults of the unit tests that come with the patches.
I think primary important is the system compiler and the last toolchain gcc. so gcc12 (we have them in QA) SLE15: gcc7 (have it in QA) SLE12: gcc48 (we do not have it in QA) so primary gap is gcc48 on SLE12.
(In reply to Marcus Meissner from comment #21) > I think primary important is the system compiler and the last toolchain gcc. > > so gcc12 (we have them in QA) > > SLE15: gcc7 (have it in QA) > > SLE12: gcc48 (we do not have it in QA) > > so primary gap is gcc48 on SLE12. It's not possible to fix gcc48. This compiler isn't supported for customers anyway (on aarch64), if we identify packages affected by the bug we want to rebuild we can rebuild them with gcc7 (the SLE15 system compiler), that's probably a good idea anyway given the premature state of aarch64 in gcc48. Note I asked the ARM folks about porting to earlier than GCC 7 and they said even GCC 6 would be a major undertaking because the frame setup code got completely rewritten for GCC 7. Not to say from GCC 4.8 to GCC 4.9 the backend was turned upside down as well.
The CRD of 2023-08-29 was yesterday, may I now submit fixed packages to openSUSE via the (public) build service?
(In reply to Richard Biener from comment #25) > The CRD of 2023-08-29 was yesterday, may I now submit fixed packages to > openSUSE via the (public) build service? No, ARM has not made the issue public yet for some reason. You may submit to openSUSE once there's a public announcement - we'll remove the EMBARGOED tag from Bugzilla when that happens.
This is an autogenerated message for OBS integration: This bug (1214052) was mentioned in https://build.opensuse.org/request/show/1110684 Factory / gcc7 https://build.opensuse.org/request/show/1110685 Factory / gcc12 https://build.opensuse.org/request/show/1110686 Factory / gcc13
is now public. Arm's security advisory can be found here: https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 The advisory includes links to Meta's own Github Advisory<https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf>, their blog post<https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html>, and Arm's patches for GCC 7-13
Fixed.
SUSE-SU-2023:3640-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1214052 CVE References: CVE-2023-4039 Sources used: Toolchain Module 12 (src): gcc12-12.3.0+git1204-1.13.1, cross-nvptx-gcc12-12.3.0+git1204-1.13.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc12-12.3.0+git1204-1.13.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc12-12.3.0+git1204-1.13.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc12-12.3.0+git1204-1.13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3662-1: An update that solves four vulnerabilities, contains two features and has 23 security fixes can now be installed. Category: security (important) Bug References: 1071995, 1084842, 1114592, 1124644, 1128794, 1129389, 1131264, 1141897, 1142649, 1146475, 1148517, 1149145, 1150164, 1160086, 1161913, 1167939, 1172798, 1178577, 1178614, 1178624, 1178675, 1181618, 1195517, 1196861, 1204505, 1205145, 1214052 CVE References: CVE-2019-14250, CVE-2019-15847, CVE-2020-13844, CVE-2023-4039 Jira References: SLE-12209, SLE-6738 Sources used: Toolchain Module 12 (src): cross-nvptx-gcc7-7.5.0+r278197-13.1, gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc7-7.5.0+r278197-13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3686-1: An update that solves one vulnerability and has four security fixes can now be installed. Category: security (important) Bug References: 1195517, 1196861, 1204505, 1205145, 1214052 CVE References: CVE-2023-4039 Sources used: SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): gcc7-7.5.0+r278197-150000.4.35.1 Basesystem Module 15-SP4 (src): gcc7-7.5.0+r278197-150000.4.35.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3662-1: An update that solves four vulnerabilities, contains two features and has 23 security fixes can now be installed. Category: security (important) Bug References: 1071995, 1084842, 1114592, 1124644, 1128794, 1129389, 1131264, 1141897, 1142649, 1146475, 1148517, 1149145, 1150164, 1160086, 1161913, 1167939, 1172798, 1178577, 1178614, 1178624, 1178675, 1181618, 1195517, 1196861, 1204505, 1205145, 1214052 CVE References: CVE-2019-14250, CVE-2019-15847, CVE-2020-13844, CVE-2023-4039 Jira References: SLE-12209, SLE-6738 Sources used: Toolchain Module 12 (src): gcc7-7.5.0+r278197-13.1, cross-nvptx-gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc7-7.5.0+r278197-13.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc7-7.5.0+r278197-13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4162-1: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: openSUSE Leap Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 openSUSE Leap Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 openSUSE Leap 15.4 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 openSUSE Leap 15.5 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 SUSE Linux Enterprise Server 15 SP2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Desktop 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Retail Branch Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Proxy 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise High Performance Computing 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Desktop 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.3.3 Basesystem Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 Basesystem Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 Development Tools Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 Development Tools Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 SUSE Package Hub 15 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Package Hub 15 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Proxy 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Retail Branch Server 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Server 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.1 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4287-1: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): gcc13-13.2.1+git7813-1.6.1, cross-nvptx-gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4287-2: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): cross-nvptx-gcc13-13.2.1+git7813-1.6.1, gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4458-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: openSUSE Leap Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap 15.4 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap 15.5 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP1 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP2 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Desktop 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Retail Branch Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Proxy 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Desktop 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.6.1 Basesystem Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 Basesystem Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 Development Tools Module 15-SP4 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 Development Tools Module 15-SP5 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Package Hub 15 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Package Hub 15 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Enterprise Storage 7.1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE CaaS Platform 4.0 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.1 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.2 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): gcc13-13.2.1+git7813-150000.1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4480-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): gcc13-13.2.1+git7813-1.10.1, cross-nvptx-gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0045-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3661-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1214052 CVE References: CVE-2023-4039 Sources used: openSUSE Leap Micro 5.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 openSUSE Leap Micro 5.4 (src): gcc12-12.3.0+git1204-150000.1.16.1 openSUSE Leap 15.4 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-testresults-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP1 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Server 4.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Desktop 15 SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Retail Branch Server 4.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Proxy 4.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro 5.3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro 5.4 (src): gcc12-12.3.0+git1204-150000.1.16.1 Basesystem Module 15-SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 Basesystem Module 15-SP5 (src): gcc12-12.3.0+git1204-150000.1.16.1 Development Tools Module 15-SP4 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-testresults-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 Development Tools Module 15-SP5 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 Legacy Module 15-SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Package Hub 15 15-SP4 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Package Hub 15 15-SP5 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-testresults-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Proxy 4.2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Retail Branch Server 4.2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Manager Server 4.2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Enterprise Storage 7 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE CaaS Platform 4.0 (src): cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1, gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro 5.1 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro 5.2 (src): gcc12-12.3.0+git1204-150000.1.16.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): gcc12-12.3.0+git1204-150000.1.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.