Bugzilla – Bug 1214988
btrfs-cleaner hangs and: watchdog: BUG: soft lockup - CPU#8 stuck for
Last modified: 2023-11-06 12:30:03 UTC
In my system I use btrfs and sometimes I have this entry in journal: Sep 05 09:52:53 pc-diego kernel: watchdog: BUG: soft lockup - CPU#8 stuck for 26s! [btrfs-cleaner:2833] Sep 05 09:52:53 pc-diego kernel: Modules linked in: rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache netfs rfcomm tcp_diag inet_diag af_packet 8021q garp m> Sep 05 09:52:53 pc-diego kernel: platform_profile syscopyarea rfkill mdio_devres sysfillrect snd sysimgblt irqbypass video pcspkr efi_pstore(N) wmi_bmof> Sep 05 09:52:53 pc-diego kernel: Supported: No, Proprietary and Unsupported modules are loaded Sep 05 09:52:53 pc-diego kernel: CPU: 8 PID: 2833 Comm: btrfs-cleaner Tainted: P OE X N 5.14.21-150500.55.19-default #1 SLE15-SP5 a29285bac85> Sep 05 09:52:53 pc-diego kernel: Hardware name: System manufacturer System Product Name/PRIME B450M-A, BIOS 3002 03/10/2021 Sep 05 09:52:53 pc-diego kernel: RIP: 0010:generic_bin_search.constprop.31+0xc4/0x190 [btrfs] Sep 05 09:52:53 pc-diego kernel: Code: 92 52 36 e9 48 c1 ff 06 48 c1 e7 0c 48 01 f8 49 8b 7d 00 48 01 d7 81 e7 ff 0f 00 00 48 8d 3c 38 4c 89 fe e8 9e f7 > Sep 05 09:52:53 pc-diego kernel: RSP: 0018:ffffb672c8063b00 EFLAGS: 00000286 Sep 05 09:52:53 pc-diego kernel: RAX: 00000000ffffffff RBX: 0000000000000033 RCX: 000000000000006c Sep 05 09:52:53 pc-diego kernel: RDX: 00000000000009f6 RSI: ffffb672c8063bef RDI: ffff99a90581b560 Sep 05 09:52:53 pc-diego kernel: RBP: 0000000000000036 R08: ffffb672c8063b98 R09: 0000000000000000 Sep 05 09:52:53 pc-diego kernel: R10: 0000000000000001 R11: ffff99a850d23e78 R12: 0000000000000031 Sep 05 09:52:53 pc-diego kernel: R13: ffff99a850d23e00 R14: 0000000000000019 R15: ffffb672c8063bef Sep 05 09:52:53 pc-diego kernel: FS: 0000000000000000(0000) GS:ffff99b2bec00000(0000) knlGS:0000000000000000 Sep 05 09:52:53 pc-diego kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Sep 05 09:52:53 pc-diego kernel: CR2: 00007f6ae7b3c000 CR3: 0000000ba9a10000 CR4: 00000000003506e0 Sep 05 09:52:53 pc-diego kernel: Call Trace: Sep 05 09:52:53 pc-diego kernel: <TASK> Sep 05 09:52:53 pc-diego kernel: btrfs_search_slot+0x400/0x920 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: btrfs_lookup_file_extent+0x4a/0x70 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: btrfs_get_extent+0x141/0x870 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? __x86_return_thunk+0x5/0x6 Sep 05 09:52:53 pc-diego kernel: ? lock_extent_bits+0x4a/0xa0 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: defrag_lookup_extent+0xcf/0x120 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: btrfs_defrag_file+0x90a/0x1230 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? __x86_return_thunk+0x5/0x6 Sep 05 09:52:53 pc-diego kernel: ? __x86_return_thunk+0x5/0x6 Sep 05 09:52:53 pc-diego kernel: ? btrfs_iget_path+0x67/0x700 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? btrfs_get_root_ref+0x18d/0x310 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? btrfs_run_defrag_inodes+0x27c/0x360 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? __x86_return_thunk+0x5/0x6 Sep 05 09:52:53 pc-diego kernel: btrfs_run_defrag_inodes+0x221/0x360 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: cleaner_kthread+0xec/0x130 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: ? csum_one_extent_buffer+0x110/0x110 [btrfs 0bea397a25b504ffddb94375cf1ffcaec85fa26b] Sep 05 09:52:53 pc-diego kernel: kthread+0x156/0x180 Sep 05 09:52:53 pc-diego kernel: ? set_kthread_struct+0x50/0x50 Sep 05 09:52:53 pc-diego kernel: ret_from_fork+0x22/0x30 Sep 05 09:52:53 pc-diego kernel: </TASK> I think the problem is related on some issue on a btrfs filesystem but I don't know on wich as every "btrfs scrub" finish correctly: pc-diego:~ # mount | grep btrfs /dev/mapper/raid-rootfs on / type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=256,subvol=/@) /dev/mapper/raid-usr on /usr type btrfs (rw,relatime,compress=zstd:9,space_cache,autodefrag,subvolid=5,subvol=/) /dev/mapper/raid-usr on /usr/local type btrfs (rw,relatime,compress=zstd:9,space_cache,autodefrag,subvolid=257,subvol=/local) /dev/mapper/raid-rootfs on /root type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=260,subvol=/@/root) /dev/mapper/raid-rootfs on /srv type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=259,subvol=/@/srv) /dev/mapper/raid-rootfs on /var type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=257,subvol=/@/var) /dev/mapper/raid-boot on /boot type btrfs (rw,relatime,space_cache,subvolid=5,subvol=/) /dev/sdc1 on /M2 type btrfs (rw,relatime,compress=zlib:3,ssd,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-var_lib_systemd_coredump on /var/lib/systemd/coredump type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-openwrt on /opt/openwrt type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-OVA on /dati/OVA type btrfs (rw,relatime,compress=zlib:9,space_cache,subvolid=5,subvol=/) /dev/mapper/raid-ISO on /dati/ISO type btrfs (rw,relatime,compress=zlib:3,space_cache,autodefrag,subvolid=5,subvol=/) /dev/mapper/nonraid-akonadi_data on /home/SSISNET/diego/.local/share/akonadi type btrfs (rw,noatime,compress=zstd:9,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-var_tmp on /var/tmp type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-NextCloud on /home/SSISNET/diego/Nextcloud type btrfs (rw,noatime,compress=zlib:3,space_cache,subvolid=5,subvol=/) /dev/mapper/raid-virtualmachines on /dati/virtualmachines type btrfs (rw,relatime,compress=zstd:3,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-tmp on /tmp type btrfs (rw,relatime,compress=zlib:3,space_cache,subvolid=5,subvol=/) /dev/mapper/raid-samba on /dati/samba type btrfs (rw,relatime,compress=zlib:3,space_cache,autodefrag,subvolid=5,subvol=/) /dev/mapper/nonraid-baloo on /home/SSISNET/diego/.local/share/baloo type btrfs (rw,relatime,compress=zstd:3,space_cache,subvolid=5,subvol=/) /dev/mapper/nonraid-var_log on /var/log type btrfs (rw,relatime,compress=zstd:3,space_cache=v2,autodefrag,subvolid=5,subvol=/) /dev/mapper/nonraid-var_cache on /var/cache type btrfs (rw,relatime,compress=zstd:3,space_cache,subvolid=5,subvol=/) /dev/bcache0 on /dati/virtualmachines/nonraid/bcache type btrfs (rw,noatime,compress=zlib:3,ssd,space_cache,subvolid=5,subvol=/) the processlist is full of btrfs-cleaner but I don't know how to undestand which partition raise the problem: pc-diego:~ # ps axuww | grep btrfs-cleaner root 1049 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 1104 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 1251 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 1554 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2178 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2283 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2371 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2479 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2538 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2638 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2696 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2756 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2779 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2797 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2815 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2833 4.0 0.0 0 0 ? S 09:46 4:09 [btrfs-cleaner] root 2852 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] root 2901 0.0 0.0 0 0 ? S 09:46 0:00 [btrfs-cleaner] ah, by the way, qcroups are off: pc-diego:~ # snapper get-config | grep QGROUP QGROUP | pc-diego:~ # mount | grep btrfs | cut -f 3 -d " " | while read a; do btrfs qgroup show $a; done ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled ERROR: can't list qgroups: quotas not enabled
*** Bug 1215287 has been marked as a duplicate of this bug. ***
The report was overlooked, sorry for the late reaction. Now adding filesystem people to Cc.
This can be solved by backporting ea0eba69a2a8 ("btrfs: don't hold CPU for too long when defragging a file"). There are some conflicts but not that hard to resolve.
I have already pushed the fix to SLE15-SP4, and it's already merged. For SLE15-SP5 it should get it through auto-merge.
SUSE-SU-2023:3988-1: An update that solves 24 vulnerabilities, contains 10 features and has 64 security fixes can now be installed. Category: security (important) Bug References: 1023051, 1065729, 1120059, 1177719, 1187236, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1208995, 1209284, 1209799, 1210048, 1210169, 1210448, 1210643, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214635, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214813, 1214873, 1214928, 1214976, 1214988, 1215123, 1215124, 1215148, 1215221, 1215523 CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-1192, CVE-2023-1859, CVE-2023-2007, CVE-2023-20588, CVE-2023-2177, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569, CVE-2023-4881 Jira References: PED-2023, PED-2025, PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004 Sources used: SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-source-rt-5.14.21-150500.13.18.1 openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1, kernel-source-rt-5.14.21-150500.13.18.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4058-1: An update that solves 18 vulnerabilities, contains three features and has 71 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1152472, 1187236, 1201284, 1202845, 1206453, 1208995, 1210169, 1210643, 1210658, 1212639, 1212703, 1213123, 1213534, 1213808, 1214022, 1214037, 1214040, 1214233, 1214351, 1214479, 1214543, 1214635, 1214813, 1214873, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214945, 1214946, 1214947, 1214948, 1214949, 1214950, 1214951, 1214952, 1214953, 1214954, 1214955, 1214957, 1214958, 1214959, 1214961, 1214962, 1214963, 1214964, 1214965, 1214966, 1214967, 1214986, 1214988, 1214990, 1214991, 1214992, 1214993, 1214995, 1214997, 1214998, 1215115, 1215117, 1215123, 1215124, 1215148, 1215150, 1215221, 1215275, 1215322, 1215467, 1215523, 1215581, 1215752, 1215858, 1215860, 1215861, 1215875, 1215877, 1215894, 1215895, 1215896, 1215899, 1215911, 1215915, 1215916, 1215941, 1215956, 1215957 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-40283, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Jira References: PED-1549, PED-2023, PED-2025 Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4057-1: An update that solves 18 vulnerabilities and has five security fixes can now be installed. Category: security (important) Bug References: 1202845, 1213772, 1213808, 1214928, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215523, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Sources used: openSUSE Leap 15.4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1 Public Cloud Module 15-SP4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4072-1: An update that solves 17 vulnerabilities and has seven security fixes can now be installed. Category: security (important) Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Sources used: openSUSE Leap 15.4 (src): kernel-obs-build-5.14.21-150400.24.92.1, kernel-livepatch-SLE15-SP4_Update_19-1-150400.9.3.1, kernel-obs-qa-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1, kernel-syms-5.14.21-150400.24.92.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 Basesystem Module 15-SP4 (src): kernel-source-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 Development Tools Module 15-SP4 (src): kernel-syms-5.14.21-150400.24.92.1, kernel-obs-build-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_19-1-150400.9.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4071-1: An update that solves 16 vulnerabilities, contains two features and has eight security fixes can now be installed. Category: security (important) Bug References: 1152472, 1202845, 1206453, 1213808, 1214928, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Jira References: PED-2023, PED-2025 Sources used: openSUSE Leap 15.5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1, kernel-source-5.14.21-150500.55.31.1, kernel-livepatch-SLE15-SP5_Update_6-1-150500.11.3.1, kernel-syms-5.14.21-150500.55.31.1, kernel-obs-build-5.14.21-150500.55.31.1, kernel-obs-qa-5.14.21-150500.55.31.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1, kernel-source-5.14.21-150500.55.31.1 Development Tools Module 15-SP5 (src): kernel-syms-5.14.21-150500.55.31.1, kernel-obs-build-5.14.21-150500.55.31.1, kernel-source-5.14.21-150500.55.31.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_6-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4093-1: An update that solves 17 vulnerabilities and has seven security fixes can now be installed. Category: security (important) Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Sources used: SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_14-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.56.1, kernel-source-rt-5.14.21-150400.15.56.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4072-2: An update that solves 17 vulnerabilities and has seven security fixes can now be installed. Category: security (important) Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Sources used: openSUSE Leap 15.4 (src): kernel-obs-build-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1, kernel-syms-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1, kernel-obs-qa-5.14.21-150400.24.92.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.